Top Stories


A Professional’s Guide

A Professional’s Guide

The interconnectivity and integrations created by the Internet of Things (IoT) deliver many benefits, but because all devices and systems can be vulnerable to breaches, this hypoconnectivity can also have a major downside.

A Measured Approach

A Measured Approach

The threat landscape continues to evolve for every business. But banks and financial services companies face especially urgent demands.

Under Lock and Key

Under Lock and Key

The interactive self-service kiosk has become a valuable, steadily growing commercial and informational tool since the launch of the first banking ATM in the 1980s. It is an essential part of our modern-day digital landscape.



verint

Moving From Legacy to Innovation

As every security professional knows well, the sector is changing rapidly thanks to emerging developments in artificial intelligence and the migration from traditional systems to integrated cyber and physical security operations.

Leveraging Technology

Leveraging Technology

Access control advancements over the years have been notable: transitioning from keys and locksets, to cards and card readers, to the sophisticated access control management systems of today.

Facebook Agrees to Pay Out $550 Million in Settlement of Facial Recognition Lawsuit

Thanks to an Illinois privacy law, eligible users will soon be able to apply for payments from Facebook for using facial scans without permission.

LifeSafety Power Promotes Matt Virga to VP Sales-North America

Physical security and access control provider adds new member to top leadership team

nist building

Federal Institute Releases Guidelines For How To Respond To Ransomware Attacks

The report, prepared by the National Institute of Standards and Technology, tested a variety of cybersecurity solutions in different IT environments to find out which methods were most effective in fighting ransomware.

white house

Coalition Pressures Government Agency To Recommend Ban on Government Use of Facial Recognition

Over 40 groups sent a letter to the Privacy and Civil Liberties Oversight Board on Monday asking the agency to recommend that the executive branch put a moratorium on facial recognition.

facial recognition system

Facial Recognition App Used By Law Enforcement To Identify Suspects Faces Blowback

New Jersey police are banned from using Clearview AI’s app, and Twitter has demanded that the small company delete any photos collected from its website.

campaign signs

Technology Companies Sign On To Offer Free or Discounted Cybersecurity Services to Campaigns

Seventeen companies, including Microsoft and Cloudflare, are offering security assistance to federal campaigns that often cannot afford the services themselves.

Bjorn Lidefelt

HID Global Names Björn Lidefelt President and CEO

Lidefelt was previously CCO at ASSA ABLOY

Ifrah Yousuf graphic of computer

Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks

Insurers have made “dramatic” increases in premiums for cyber-insurance and are considering lowering the ransom amounts they will pay.

CBP Sign

Customs and Border Protection Plans to Expand Use of Facial Recognition in Global Entry Program

The agency says that the privacy risks to travelers will actually be lower with the facial scans, since they will no longer have to offer fingerprint data in order to enter the U.S.

gun retailer

New Security, Video Surveillance Requirements For Illinois Gun Dealers Go Into Effect

The regulations originally required gun retailers to have a backup of all video surveillance feeds, but has since been changed.

iowa democratic party

Despite Hacking Threats, Iowa and Nevada Democratic Caucuses Will Use Mobile Apps to Tally Votes

Party leaders say they have taken steps to protect cybersecurity and that there will be paper records to verify each vote for the final results.

european union flags

European Union Contemplates Banning Facial Recognition For Three To Five Years

While the ban is on the table, EU leadership ultimately says it would be a “far-reaching measure” with the potential to stifle the development of the technology.

maryland state house

Ransomware Possession Would Become A Crime In Maryland Under Proposed Legislation

Lawmakers are trying to deter would-be hackers from carrying out cyber attacks that have paralyzed companies, hospital systems and local governments, including Baltimore’s city government.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.