Top News


Can “Regular” Threat Actors Become Quasi-APTs?

The proliferation of cyber-offensive capabilities has been thoroughly discussed in recent years by academics and think tankers alike.

Biden Administration Releases Domestic Counter-Unmanned Aircraft Systems National Action Plan

The Biden Administration is releasing the first whole-of-government plan to address UAS threats in the Homeland.

Vulnerability Risks Within the Energy Sector: Current Risks and Why Going Passwordless is Vital

Vulnerability Risks Within the Energy Sector: Current Risks and Why Going Passwordless is Vital

In recent years, we’ve seen an influx of cybersecurity threats compromising energy players, from Saudi Aramco in 2012 to the Colonial Pipeline last year, both of which have had the power to halt the flow of fuel to entire states and nations. In fact, a 2019 survey of global utilities by Siemens and the Ponemon Institute showed 56% of respondents reported that, in the last 12 months, their organization experienced at least one attack that resulted in the loss of private data or an outage.

Registration Opens for Global Security Exchange (GSX) 2022

Registration Opens for Global Security Exchange (GSX) 2022

ASIS International, the world’s largest association for security management professionals, has opened registration for Global Security Exchange (GSX) 2022, a hybrid event taking place 12-14 September that will offer a digital experience on the GSX online platform as well as an in-person event at the Georgia World Congress Center (GWCC) in Atlanta, GA.

Building the Future We Deserve – A Cyber Success Story

Building the Future We Deserve – A Cyber Success Story

Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).

Joseph Grillo Announces Retirement from ACRE

A proven and respected leader who has driven ACRE's business transformation and growth strategy, Grillo's deep knowledge of the security and access control businesses resulted in strong operating results, a track record of 11 successful acquisitions, innovative solutions and a relentless commitment to ACRE's customers, partners and employees.

Midwest Security joins ABLOY Critical Infrastructure Global Solutions National Account Partner Program

ABLOY Critical Infrastructure Global Solutions announced today that Midwest Security Products Inc. has joined its new National Accounts Partner program for top security systems integrators in North America.



Allegion to Acquire Stanley Black & Decker’s Access Technologies Business

Allegion plc, a global security products and solutions provider, has signed a definitive agreement to acquire Stanley Access Technologies LLC and assets related to the automatic entrance solutions business from Stanley Black & Decker, Inc. for $900 million in cash.

Passengers Bring Guns to TSA Checkpoints as a Dangerous Trend Continues

Passengers Bring Guns to TSA Checkpoints as a Dangerous Trend Continues

A man headed for Seattle came to a Transportation Security Administration (TSA) checkpoint at Tampa International Airport with a Bersa Thunder semi-automatic pistol. The weapon was loaded with six rounds; one bullet was chambered.

Featured

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.