Top Stories


Evaluating Access Control

The pandemic continues to challenge businesses in terms of security, safety and changing working conditions.

Securitas Launches Technology Life Cycle Management Tool SecureStat

Security Electronic Security, Inc. (SES) is pleased to announce SecureStat® 360 is now fully available for SES clients. Introduced last fall at the Global Security Exchange (GSX) show, SecureStat 360 provides a complete view of a company’s security technology life cycle from product installation to replacement.

Ransomware Attacks Rise Almost 93% in 2021, According to New Research

Global cyber security and risk mitigation expert NCC Group has revealed that ransomware attacks almost doubled in 2021, rising 92.7% year-on-year, according to its 2021 Annual Threat Monitor



Survey: 88 Percent of Companies are Experiencing Increase in Physical Security Threats

Survey: 88 Percent of Companies are Experiencing Increase in Physical Security Threats

As companies continue hybrid work in this third year of COVID-19, already high levels of physical threats are expected to continue to rise, significant health and safety protocol-related conflicts between management and employees are occurring, and workplace violence preparedness at businesses is primarily reactive and inconsistent.

Gallagher Welcome Three New Appointments to the Americas Team

Gallagher has announced the appointment of Andres Maurcio De La Ossa Garzon, Jason Raptis, and Leonel Urrutia within their Americas team.

Edge360 Boosts Leadership Team to Drive Operational Efficiencies, Support Aggressive Sales Strategies

Edge360 has announced additions to its leadership team to meet evolving customer requirements for the company’s mission-critical video management solutions.

Cybersecurity and Infrastructure Security Agency Issues Advisory Regarding Possible Russian Cyberattacks

Cybersecurity and Infrastructure Security Agency Issues Advisory Regarding Possible Russian Cyberattacks

The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) issued a joint Cybersecurity Advisory titled, “Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology.”

Report: 96 Percent of Companies Continue to Experience Challenges Protecting Data from Insider Risk

Report: 96 Percent of Companies Continue to Experience Challenges Protecting Data from Insider Risk

Code42 recently released its Annual Data Exposure Report for 2022 on Insider Risk. The study, conducted by Vanson Bourne, found that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak and theft.

Attivo Networks Wins DoD SBIR Contract for Unique Approach to Ransomware Mitigation

Attivo Networks® has announced it was awarded a Department of Defense (DoD) Small Business Innovation and Research (SBIR) contract through AFWERX/AFVentures for its ransomware mitigation capabilities. The contract extends Attivo’s strategic support to the three major branches of the DoD – Air Force, Army and Navy.

National Cybersecurity Alliance and PCI Security Standards Council Issue Joint Bulletin on Ransomware Attack

National Cybersecurity Alliance and PCI Security Standards Council Issue Joint Bulletin on Ransomware Attack

The PCI Security Standards Council (PCI SSC) and the National Cybersecurity Alliance issued a joint bulletin on the increasing threat of ransomware attacks.

Mostly Ignored Cybersecurity Collaboration is Becoming a Reality

Times have started changing for the better in the U.S. cybersecurity world. After years of minimal effort to get together to discuss cyberattacks and breaches and share some pertinent data, big companies and the federal government have finally started to collaborate on mitigating big cybersecurity issues.

Stadium Security Goes High-tech With Elevated Standards, New Innovations

Stadium Security Goes High-tech With Elevated Standards, New Innovations

When it comes to physical security, the world around us has changed. First, society has changed, with more social unrest and violence occurring in the COVID-19 era, including a rise in fan misbehavior at sporting events. Second, stadiums have changed, with more high-tech amenities, luxuries and conveniences.

Corporate Organizations: Have You Made Your Solutions Permanent?

For a variety of reasons, cybersecurity experts are urging caution as we enter 2022.

Supply Chain Hits Cybersecurity Hard

The unpredictable shortage of goods because of pandemic-triggered supply chain problems is broad: plastic cup lids, woodworking tools, paper goods, and lumber, to name a few.

Balancing Fraud Prevention and Customer Experience

We sat down with Bala Kumar, CPO of Jumio, to discuss balancing the customer and fraud prevention.

Why Hardware-Encrypted USB Drives Are the Best Option for Regulatory Compliance in 2022

Many governments and industries worldwide have mandated that various forms of personal data be protected by encryption while at rest or in transit.

InfraGard National Members Alliance and NEC Corporation of America Join Forces in the Fight Against Human Trafficking

InfraGard National Members Alliance, an FBI-affiliated nonprofit organization dedicated to protecting U.S. critical infrastructure and the American people, and NEC Corporation of America have joined forces in the fight against human trafficking. In honor of National Human Trafficking Prevention Month in January,

2022 Payments Summit Agenda Features In-Depth Sessions on Mobile and Contactless Trends, BNPL, Fraud Mitigation, Cryptocurrency and Authentication

The Secure Technology Alliance’s 2022 Payments Summit will feature a full agenda of industry-defining topics. Sessions will explore contactless and NFC innovations, buy now, pay later and peer-to-peer transactions.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”