Top News


New York Skyline

The Cost of Security

Traveling to and participating in ISC East is always a pleasure. For me, I can get a little closer to learning about security solutions, and possibilities for integration tomorrow. I always ask the question of “this is a great solution, but what will it do tomorrow?”

Risk-based Approach to Festivals and Fairs

Risk-based Approach to Festivals and Fairs

The event security industry, which includes concerts, conventions, sporting and other special events, was one of the sectors hit hardest by the global pandemic, as events ground to a halt overnight, but the sector has come roaring back to life with lightning speed.

Key Tech Trends

Key Tech Trends

Video analytics is in the midst of a revolution. For decades, the video surveillance goal was primarily to record video for later review in the event of a security-related incident.

Creating a Stance

Creating a Stance

Video security systems have been effective deterrents to crime because of its ability to capture and present evidence of events that have happened. Such systems can be invaluable in protecting people and assets.

Driving Security to News Heights

According to a 2022 study conducted by Ponemon Institute, the average U.S. enterprise manages approximately 135,000 endpoint devices. Given that most, if not all of these devices require dependable power to maintain functionality, the need to deliver reliable power efficiently to devices, which is critical to building safety, security and comfort have never been higher.

Control Your Room

Control Your Room

There is an understanding that doing a job right requires the right tools. However, recent years have seen rising awareness that furniture does not merely provide a post from which to do a job. Instead, contributing to successful outcomes requires the right furniture.

Looking Forward to 2023

Talking to an industry associate in early November, we laughed a little bit about the fact that it is (almost) 2023. Well, we were planning for print material for next year. The conversation led us into a quick discussion about Y2K.

Video Metadata: Describing the Details that Matter

Modern surveillance systems generate an overwhelming (and mostly unused) amount of data. This is especially true when recording video in 24/7 operations, which is essential to capturing evidence, incidents and events



Constantly Evolving

Constantly Evolving

Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.

Is your access control system cyber secure?

Is Your Access Control System Cyber Secure?

Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.