Top Stories


ASIS International Introduces New ANSI-Approved Investigations Standard

ASIS International, a leading authority in security standards, is excited to announce the release of its revised American National Standards Institute (ANSI)-approved standard dedicated to investigations. The revised Standard provides requirements and guidance for the collection and examination of information pursuant to an investigation.

Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology.

Acre Security Confirms Kumar Sokka as CEO to Lead Next Phase of Growth

Acre Security, a global provider of integrated security technology, today announced that Kumar Sokka has officially assumed the role of Chief Executive Officer. This transition marks the next step in a planned leadership evolution, reflecting Acre’s continued focus on long-term growth, innovation, and customer success.



Security LeadHER 2025 Fosters Growth, Engagement and Community for Women in Security

ASIS International and the Security Industry Association (SIA) ASIS International and the Security Industry Association (SIA) have closed out a successful third annual Security LeadHER conference, a unique event dedicated to advancing, connecting and empowering women in the security profession. The sold-out event was held June 9-10, 2025, in Detroit, Michigan, gathering approximately 450 security professionals from across the United States and internationally.

Allegion to Acquire ELATEC, Bolstering Electronics Portfolio with Leader in Reader and Credential Technology

Allegion plc, global security products and solutions provider, through one of its subsidiaries, has signed a definitive agreement to acquire ELATEC, including Elatec GmbH and other group entities, ("ELATEC") from Summit Partners for €330 million on a cash-free, debt-free basis. Allegion expects to fund the acquisition through a combination of cash on hand and borrowings under its existing revolving credit facility.

Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years.

Genetec Brings Powerful New Capabilities to Security Center SaaS

Genetec Inc., the global leader in enterprise physical security software, today announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution. Since its launch, Genetec has delivered new features to the platform every 12 days. This ensures Genetec provides a flexible, open, SaaS solution that is continuously extended to meet the needs of any modern security operation.

AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape.

Hanwha Vision Holds Pricing Steady Amid Tariff Volatility

Hanwha Vision confirmed that it would not raise prices on its surveillance technologies despite rising tariffs and market disruptions. The company said it will absorb any additional costs created by tariffs on components integral for manufacturing surveillance cameras and devices, adding that supporting dealers and end users is the highest priority, especially in the face of uncertain economic and market conditions.

ESX 2025 to Kick Off with Exclusive New Member Meetup

This year, ESX 2025 will kick off with a brand-new event designed to help first-time attendees and new ESA members make the most of their time onsite. The New Member Meetup, scheduled for Monday, June 16 from 3:15 – 4:15 PM, will provide a welcoming space for networking, resource sharing, and community building ahead of the week’s programming.

Analysis of AI Tools Shows 85 Percent Have Been Breached

AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk.

Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape.

Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe.

Evolving Cybersecurity Strategies

Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors.

Arrow Security Celebrates Grand Opening of New Boston Office

Arrow Security officially opened its new Boston office located at 225 Friend Street with a ribbon cutting ceremony on Friday, May 16. The event commemorates a key milestone in Arrow’s national expansion strategy and coincides with a celebration of the company’s 40th Anniversary.

ASIS International Unveils Program for GSX 2025

ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2025 with in-person and digital experiences taking place 29 September – 1 October at the Ernest N. Morial Convention Center in New Orleans, LA, and via the online GSX event platform.

Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities