Top Stories


Why Having a Cybersecurity Awareness Month is a Good Idea

Cybersecurity isn’t a controversial topic and practice. Especially in an era where daily stories break about breaches and thefts of enterprises, government agencies, and even individuals, most computer literate people are aware of the potential for harm.

March Networks, Vivotek Now Under Same Ownership

Delta, owner of surveillance subsidiary Vivotek, has approved the purchase of 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance manufacturer March Networks from Infinova International Ltd. for $114 million through its subsidiary Delta International Holding Limited B.V.

Nice Strengthens Global Smart Home & Building Automation Leadership Position

Nice, a global manufacturer of Smart Home, Security, and Home & Building Automation solutions, announced today it has acquired Nortek Security & Control, LLC from Melrose Industries.



Report: Ransomware Biggest Cybersecurity Threat So Far in 2021

Ransomware remained the standout threat in the first half of the year as cyber criminals continued to target big-name victim.

Live From GSX 2021 Roundup

This year’s Live From GSX was a huge hit thanks to the support of our sponsors: NAPCO Security Technologies, Inc.; OnSolve; and Salient Systems.

Satisfied Customers

Even though there were not throngs of attendees, as in past years, ASIS still produced a good tradeshow in Orlando. Many exhibitors that I talked with were pleased with the quality of booth visitors.

GSX 2021: Jump-Starting the Return to Normal

Last year, ASIS made the call to convert GSX 2020 into a virtual event against the backdrop of COVID-19. This year’s conference, then, marked the return of GSX as an in-person event

An Uninterrupted Lifeline

An Uninterrupted Lifeline

For a first responder rushing into a building emergency, losing communication with their teams inside or outside of the building can be terrifying.

The Next Normal

After the COVID-19 pandemic and safer-at-home restrictions of 2020, many homeowners and businesses are well on their way to returning to their ‘next’ normal.

Extraordinary Value

Extraordinary Value

Every technology industry is talking about the benefits of Artificial Intelligence. More than a buzzword, AI is hyped as a panacea, while at the same time, it is often misunderstood by those who might benefit from it the most.

Drivers and Implications

Drivers and Implications

Artificial Intelligence (AI) has been around since the 1950s when scientists and mathematicians essentially wanted to see if they could make machines think like humans. Since these early notions of AI, technology has advanced at a gradual rate.

Coming of Age

Coming of Age

There have been on-going discussions the past several years about how Big Data and Artificial Intelligence (AI) can be used to modernize physical security systems and operations.

Take Nothing for Granted

Contemplating a topic in the industry I have not given space in the last 20 years, I seem to be in a daze. Then I received an email about Women in Security. I dialed up a couple of friends to get their take on what is a relatively new organization.

Once and For All

Anyone who knows Disney at all probably remembers the movie “Fantasia,” and relating to Mickey Mouse in “The Sorcerer’s Apprentice,” as he cast a spell on a broom to do his chores for him and make his life a little easier.

Connecting Networks

Connecting Networks

The Internet of Things (IoT) is turning dumb houses into smart homes. It is also revolutionizing access control systems for all types of commercial buildings, from small offices and retail shops to enterprise campuses and sprawling factories.

Overcoming Big Challenges

Despite the fact that the security market is changing, many businesses are configuring, installing and troubleshooting IP security cameras using laptops, even though it’s time consuming and ineffective.

The Time Has Come

The Time Has Come

Despite the rapid rollout of vaccines, the impact and ramifications of COVID-19 will be long felt in almost every part of the economy. Many businesses have needed to pivot and adapt quickly to new ways of working.

A Hybrid Work Environment

A Hybrid Work Environment

As companies begin to repopulate their offices with workers who have spent the last 12-15 months toiling from their overcrowded kitchen tables and other non-traditional work settings, now faced with a potentially catastrophic problem.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.