Top Stories


Stop the Cybersecurity Blame Game

In December, genetic testing company 23andMe acknowledged a hack that led to the theft of nearly seven million customers’ data. As the New York Times reported, criminals obtained “ancestry trees, birth years and geographic locations.” This kind of digital theft may have felt personal to many of those impacted.

Security Today Announces The Govies Government Security Award Winners for 2024

Security Today is pleased to announce the 2024 winners in The Govies Government Security Awards. The awards honor outstanding government security products in a variety of categories.

Live from ISC West: Pre-Show Preview

It’s hard to believe, but ISC West 2024 is almost here. This year’s show will take place April 9-12 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from ISC West 2024 page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor!



Snap One to Display Solutions from Clare, Control4 and More at ISC West

Snap One, a manufacturer and distributor of smart-living technology for professionals and consumers, will demonstrate a range of products and solutions designed to help Partners build stronger businesses, elevate customer satisfaction, and transform the industry at ISC West 2024 Booth #10053.

Reflections of My 28th ISC West Experience

As the security industry's pinnacle event, ISC West continues to draw seasoned professionals, eager newcomers and curious innovators. Among them stands a figure whose presence has become synonymous with both the event and the industry's evolution—the veteran editor, now embarks on year 28 to the heart of innovation and security.

A Biometric Revolution

In an era where technological advancements redefine the way we live and work, the transition from classic credentials to biometric authentication stands out as a pivotal shift in the realm of security. Nearly gone are the days of traditional badges and access cards; instead, our own unique biological markers are taking center stage, offering a more secure and seamless authentication experience.

PSIA Approves PDKC Over ODSP Specification

The Physical Security Interoperability Alliance (PSIA) today announced its Public Key Open Credential (PKOC) specification has expanded to support Open Supervised Device Protocol (OSDP). The new specification, PKOC over OSDP version 1.63, was unanimously ratified by the PSIA Board on March 22. It demonstrates how the ecosystem for PKOC, an open and freely available specification, can be extended to support a range of access control use cases.

Solving Loitering and Open Access Challenges

Loitering is generally not considered a crime with few instances of arrests reported nationally, but it is becoming an increasing problem for a multitude of reasons. One being the use of private spaces such as public-faced restrooms for drug use, other forms of illicit behavior, or as safe havens where homeless individuals are seeking shelter and protection from the elements. In any case, the misuse and prolonged occupancy of publicly accessible spaces prevents them from being accessed for their intended purposes by legitimate users.

ProdataKey Software Platform Introduces Built-In Integrations with Leading Camera Manufacturers

ProdataKey (PDK), manufacturer of cloud access control platform built for mobile, now gives PDK.io system users access to immediate, turnkey integrations with cameras from five manufacturers from within its settings interface: Digital Watchdog, Hanwha Wisenet Wave, NX Witness, Turing, and Spot AI.

Shaping the Use of Technology

In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.

Adapting to See Change

Imagine a retail world rapidly transforming, a landscape where the traditional brick-and-mortar model faces the relentless tide of e-commerce. Well, there is no need to imagine as this is 2024, where market losses surpass $112 billion, and the term “retail apocalypse” is not just hyperbole but a stark reality. 

Vehicle Ramming Attacks

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.

Enhancing Autonomy Software

In the realm of national and global security, safeguarding critical infrastructure is paramount. It is not just about erecting physical barriers; it is about deploying perimeter security software capable of autonomous detection, alerting, and deterring potential threats. The integration of autonomy software into existing perimeter security systems marks a significant advancement in this field and is now imperative for an effective system.

Early Detection and Deterrence

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.

How to Roll Out Microsoft Copilot Securely and Ensure Data Security

Microsoft Copilot is a robust AI productivity tool integrated into Microsoft 365 applications. Copilot can significantly improve your daily workflows by assisting you with drafting documents and presentations, capturing action items in Teams meetings, analyzing data in Excel, and other tasks. However, adopting Copilot can also introduce unexpected data security risks because it is built on native access controls within Microsoft 365, meaning it can access all data a user has access to, including documents, emails, and notes. Therefore, it is crucial to prepare your organization for a secure Copilot rollout and ensure that your sensitive data remains under control in the future.

Going Beyond the Perimeter

Wireless locks are a growing segment of the electronic access control (EAC) market, increasing at a rate of 8% annually in the Americas, according to OMDIA. They can be used in a variety of applications and provide many of the benefits of traditional hard-wired access control. Depending on the type, they can be managed as standalone solutions or as part of Physical Access Control Software (PACS) systems.

The Need to Hear and be Heard

Have you ever tried to watch a movie in a movie theater and the sound suddenly stopped working? Or you attended a musical concert, but the sound system failed? What happened? More than likely, the movie or concert stopped until the sound and audio were fixed. Or if it could not be fixed, you likely departed and your money refunded. After all, it is pointless to watch a movie or attend a concert without sound. You are not getting the whole experience.

3xLOGIC Launches VIGIL NVR Case Management Providing Cloud Storage for Sensitive Video Clips

3xLOGIC, a provider of integrated and intelligent security solutions, has launched VIGIL NVR Case Management, a cloud storage solution designed for sensitive video clips. The standalone solution provides cloud storage capability to VIGIL NVRs, making it easier for operators to review, share, and store video clips in a single place.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.