Networking Security


Why AI and Cloud are Topping 2022 Trends Lists

Why AI and Cloud are Topping 2022 Trends Lists

It is the time of year for reflections, resolutions, predictions and lists. News stories about trends are everywhere, with tips about getting businesses on track for success in 2022.

Delivering Actionable Insights

Delivering Actionable Insights

Artificial intelligence (AI) enables machines to learn, understand, and act accordingly – giving it enormous potential.

Taking the fear out of IoT security concerns

Taking the Fear Out of IoT Security Concerns

The IoT presents a huge opportunity market. Every second, 127 new IoT devices are connected to the web, and experts predict that by 2025, that figure will equate to more than 75 billion connected devices overall. Unfortunately, this volume of connected devices brings inevitable security risks.

Cashing in on Your VMS System

Cashing in on Your VMS System

In banking today, the FBI and Federal Deposit Insurance Corp. (FDIC), have mandated security standards that require a minimum number of cameras and camera resolution in each facility.

The Advantages of Integrating Networking and Security with SASE for Today’s Organizations

The Advantages of Integrating Networking and Security with SASE for Today’s Organizations

The security approaches we counted on to secure our networks and protect our IT resources against attackers are no longer up to the task.

Video Surveillance Takes to the Cloud

Video Surveillance Takes to the Cloud

It was not all that long ago when discussion of professional security services on the Cloud seemed all but preposterous due to bandwidth and security concerns.

Connecting Networks

Connecting Networks

The Internet of Things (IoT) is turning dumb houses into smart homes. It is also revolutionizing access control systems for all types of commercial buildings, from small offices and retail shops to enterprise campuses and sprawling factories.

Coming of Age

Coming of Age

There have been on-going discussions the past several years about how Big Data and Artificial Intelligence (AI) can be used to modernize physical security systems and operations.



Survey: 62% of Respondents Don

Survey: 62% of Respondents Don't Care, or Aren't Sure if they Care, if the AI Used in their Video Security is Biased

Pro-Vigil, a provider of remote video monitoring, management and crime deterrence solutions, recently published a research report that found organizations are more concerned about their Artificial Intelligence (AI)-powered video surveillance system's ability to deter crime than any potential bias issues.

The Changing Marketplace

The Changing Marketplace

As the Internet of Things (IoT) has continued to evolve, so, too, have the options for pairing smart home integration with both professionally monitored and self-monitored home security solutions.

SIA Opposes Reintroduction of Facial Recognition & Biometric Technology Moratorium Act

SIA Opposes Reintroduction of Facial Recognition & Biometric Technology Moratorium Act

The Security Industry Association (SIA) has announced its strong opposition to the Facial Recognition and Biometric Technology Moratorium Act

The Power to Predict

The Power to Predict

Imagine when you know what’s next. You can respond before potential situations occur and anticipate business opportunities that create new revenue streams or reduce operational costs.

Technology counts on AI to authenticate and identify people

Always Surrounded

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.

Connected Doesn’t Mean Protected

Connected Doesn’t Mean Protected

When it comes to device and systems connectivity, surge protection solutions can mitigate risk

Enterprise “Lift and Shift” to the Public Cloud Requires a Newer Type of API and Cloud Security Program to Prevent Data Breaches

Enterprise “Lift and Shift” to the Public Cloud Requires a Newer Type of API and Cloud Security Program to Prevent Data Breaches

One of our best customers is a Fortune 50 financial services company for homeowners across America.

Lessons Learned from Oldsmar Water Plant Hack

Lessons Learned from Oldsmar Water Plant Hack

Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.

Current and future uses in the commercial security industry

On a Cloud of its Own

Cloud-based technology and solutions have become more and more mainstream, especially in the commercial security industry.

VOCAL Technologies Creates Unique Solution to Help Alarm Companies Make a Smooth Transition from Analog to VoIP Phone Lines

VOCAL Technologies Creates Unique Solution to Help Alarm Companies Make a Smooth Transition from Analog to VoIP Phone Lines

It is the end of the line for analog phone systems, which can leave alarm companies hanging out to dry trying to figure out if they need to replace costly alarm panels.

SASA Secure Networking

How SASE is Defining the Future of Secure Networking

As the digital transformation trend continues to highlight business agendas, now more than ever enterprises need infrastructure solutions that enable them to connect more locations at faster speeds.

A True Calling

A True Calling

If the pandemic has taught us anything, it’s that secure remote access to systems is no longer a “nice to have” feature.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities