Top News


Research: Supply Chain Cyber Attacks Continue to Increase

Organizations have an opportunity to reduce their third-party risk by clarifying whether they or their suppliers are responsible for supply chain risk management, according to new global research of 1400 cybersecurity decision makers by NCC Group.

Study: Home Technology Industry Now Exceeds $20 Billion

CEDIA, the global trade association for the home technology industry, recently released the Integrated Home Market Analysis in partnership with leading market research firm, Ancrage Consulting LLC. The results highlight the strength and stability of the estimated $20.1B integrated home market.

Allied Universal® Becomes a Global Leader in Electronic Monitoring Through Attenti Acquisition

Allied Universal® continues its strategic growth with the acquisition of Attenti Group. Allied Universal will integrate Attenti Group with G4S Monitoring Technologies, to create Allied Universal Electronic Monitoring Services.

A Line in the Sand

There is a line in the sand where security is evident, and if crossed security begins to wane. In our security pursuits each day as journalists, we’re fortunate to be able to talk with many of you and learn about new technology, adaptable solutions and secure outcomes.

Mitigating Violence

Mitigating Violence

Hospitals and health systems are tasked with controlling costs and cutting budgets while maintaining the highest levels of patient care, safety and privacy which heighten our awareness of the vital role played by security services in the nation’s ever-evolving healthcare landscape.

Systems Integration or Unification?

Systems Integration or Unification?

In the physical security industry, the terms integration and unification are often used interchangeably. It is common to hear people mention ‘unified security’ when talking about integrating systems. The truth is— there is a difference between these approaches.

The Emergence of Analytics

The Emergence of Analytics

Television and movies have always had interesting ideas regarding the capabilities of surveillance cameras. Crime shows like CSI would have viewers believe a still frame can be “enhanced” to near-infinite clarity with just a few keystrokes.

Bringing Out the Best

Bringing Out the Best

Recent physical security trends are all about mitigating today’s risks using highly integrated, open-source technology. Now, more than ever, security practitioners require comprehensive, multi-faceted solutions that can quickly pivot to meet new challenges.



ISC West Wraps Up With Nearly 20,000 Total Professionals in Attendance

ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), came to a close last Friday with record-breaking attendance growth for 2022.

Going High Tech

When it comes to physical security, the world around us has changed. First, society has changed, with more social unrest and violence occurring in the COVID-19 era, including a rise in fan misbehavior at sporting events.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.