Top News


Can “Regular” Threat Actors Become Quasi-APTs?

The proliferation of cyber-offensive capabilities has been thoroughly discussed in recent years by academics and think tankers alike.

Biden Administration Releases Domestic Counter-Unmanned Aircraft Systems National Action Plan

The Biden Administration is releasing the first whole-of-government plan to address UAS threats in the Homeland.

Vulnerability Risks Within the Energy Sector: Current Risks and Why Going Passwordless is Vital

Vulnerability Risks Within the Energy Sector: Current Risks and Why Going Passwordless is Vital

In recent years, we’ve seen an influx of cybersecurity threats compromising energy players, from Saudi Aramco in 2012 to the Colonial Pipeline last year, both of which have had the power to halt the flow of fuel to entire states and nations. In fact, a 2019 survey of global utilities by Siemens and the Ponemon Institute showed 56% of respondents reported that, in the last 12 months, their organization experienced at least one attack that resulted in the loss of private data or an outage.

Registration Opens for Global Security Exchange (GSX) 2022

Registration Opens for Global Security Exchange (GSX) 2022

ASIS International, the world’s largest association for security management professionals, has opened registration for Global Security Exchange (GSX) 2022, a hybrid event taking place 12-14 September that will offer a digital experience on the GSX online platform as well as an in-person event at the Georgia World Congress Center (GWCC) in Atlanta, GA.

Building the Future We Deserve – A Cyber Success Story

Building the Future We Deserve – A Cyber Success Story

Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).

Joseph Grillo Announces Retirement from ACRE

A proven and respected leader who has driven ACRE's business transformation and growth strategy, Grillo's deep knowledge of the security and access control businesses resulted in strong operating results, a track record of 11 successful acquisitions, innovative solutions and a relentless commitment to ACRE's customers, partners and employees.

Midwest Security joins ABLOY Critical Infrastructure Global Solutions National Account Partner Program

ABLOY Critical Infrastructure Global Solutions announced today that Midwest Security Products Inc. has joined its new National Accounts Partner program for top security systems integrators in North America.



Allegion to Acquire Stanley Black & Decker’s Access Technologies Business

Allegion plc, a global security products and solutions provider, has signed a definitive agreement to acquire Stanley Access Technologies LLC and assets related to the automatic entrance solutions business from Stanley Black & Decker, Inc. for $900 million in cash.

Passengers Bring Guns to TSA Checkpoints as a Dangerous Trend Continues

Passengers Bring Guns to TSA Checkpoints as a Dangerous Trend Continues

A man headed for Seattle came to a Transportation Security Administration (TSA) checkpoint at Tampa International Airport with a Bersa Thunder semi-automatic pistol. The weapon was loaded with six rounds; one bullet was chambered.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.