Top News


Five Ways to Help Secure Your Data in Light of the IRS Breach

Five Ways to Help Secure Your Data in Light of the IRS Breach

Action steps people can take to make it more difficult for hackers.

Library Complained about Poor Security Before Artwork Disappeared

Library Complained about Poor Security Before Artwork Disappeared

The Boston Public Library’s largest union had repeatedly complained about the lack of security during renovations.

Facebook Baits Users with Security Checkup

Facebook Baits Users with Security Checkup

Company provides security features and tools to empower individual account users.

ZKAccess Now Offers A Free 3-credit CEU Course Accredited By ESA & BICSI

Advanced Biometric Access Control designed to teach physical security integrators all they need to know about successful migration from traditional card access systems to biometrics.

Recent Piracy Activity Onboard Oil Tanker Exposes Need for Greater Security on Ships and at Ports

Oil tanker Oriental Glory averted by group of 30 pirates, went on board, robbed the crew and siphoned tons of fuel.

SureView Systems Establishes New Partnership with Access Security Corporation

Full-service security integration firm to offer Immix command center software.

Farpointe's New Vandal- and Bullet-resistant Contactless Card Readers Take a Hit

Increased access control security from thugs, delinquents, criminals and terrorists.

Commonwealth Center for Children and Adolescents Selects AMAG Technology's Symmetry

Newly strengthened partnership between AMAG Technology and Salient Systems provides unmatched security system for adolescent mental health hospital.



Delta Vehicle Access Control Systems Integral to Meeting CIP-014

Protects electric power infrastructures from terrorist vehicle attacks.

First Online Security Game Launched to Help Educate and Raise Awareness

IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.