Top Stories


Proactive Cybersecurity: Increased Safety Measures Make All the Difference

The infrastructure of the United States is under attack, as foreign criminals use advanced skills and exploit company vulnerabilities to cripple operations, disrupt industrial control systems, and ultimately inflict significant damage, both monetarily and economically.

Predicting the Cybersecurity Future

Predicting the Cybersecurity Future

Wouldn’t it be nice to have a crystal ball to understand exactly what we can expect in 2023 from the Cybersecurity world?

Paxton Hires Kevin MacKenzie in Keeping with Growth Strategy

Paxton, the global brand of electronic IP access control, video surveillance and video intercom systems, has hired a new and highly experienced addition to their U.S. sales team, as they continue to accelerate growth across North America.



New York Skyline

The Cost of Security

Traveling to and participating in ISC East is always a pleasure. For me, I can get a little closer to learning about security solutions, and possibilities for integration tomorrow. I always ask the question of “this is a great solution, but what will it do tomorrow?”

Risk-based Approach to Festivals and Fairs

Risk-based Approach to Festivals and Fairs

The event security industry, which includes concerts, conventions, sporting and other special events, was one of the sectors hit hardest by the global pandemic, as events ground to a halt overnight, but the sector has come roaring back to life with lightning speed.

Key Tech Trends

Key Tech Trends

Video analytics is in the midst of a revolution. For decades, the video surveillance goal was primarily to record video for later review in the event of a security-related incident.

Creating a Stance

Creating a Stance

Video security systems have been effective deterrents to crime because of its ability to capture and present evidence of events that have happened. Such systems can be invaluable in protecting people and assets.

Driving Security to News Heights

According to a 2022 study conducted by Ponemon Institute, the average U.S. enterprise manages approximately 135,000 endpoint devices. Given that most, if not all of these devices require dependable power to maintain functionality, the need to deliver reliable power efficiently to devices, which is critical to building safety, security and comfort have never been higher.

Control Your Room

Control Your Room

There is an understanding that doing a job right requires the right tools. However, recent years have seen rising awareness that furniture does not merely provide a post from which to do a job. Instead, contributing to successful outcomes requires the right furniture.

Looking Forward to 2023

Talking to an industry associate in early November, we laughed a little bit about the fact that it is (almost) 2023. Well, we were planning for print material for next year. The conversation led us into a quick discussion about Y2K.

Video Metadata: Describing the Details that Matter

Modern surveillance systems generate an overwhelming (and mostly unused) amount of data. This is especially true when recording video in 24/7 operations, which is essential to capturing evidence, incidents and events

Constantly Evolving

Constantly Evolving

Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.

Is your access control system cyber secure?

Is Your Access Control System Cyber Secure?

Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.

Fortanix Expands Relationship with AWS, Fortanix Data Security Manager Works with the AWS KMS External Key Store

Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.

Debunking the Misconceptions of Open Source Security Platforms

The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.

Genetec Guides Utility Companies on Security System Support for NERC CIP Compliance

Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC).

The Products are Nice, But People are the Key

The Products are Nice, But People are the Key

There is nothing like a product tradeshow to get your hands a “little dirty” handling and asking questions about new products. When all is said and done, the people make the difference.

FCC Bans Equipment Authorizations for Chinese Telecommunication, Video Surveillance Equipment Deemed Threat to National Security

FCC Bans Equipment Authorizations for Chinese Telecommunication, Video Surveillance Equipment Deemed Threat to National Security

The Federal Communications Commission adopted new rules prohibiting communications equipment deemed to pose an unacceptable risk to national security from being authorized for importation or sale in the United States.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities