Top Stories


PureTech Systems’ Announces Successful Deployments with Siklu

Siklu and PureTech have deployed perimeter protection at high security power generation plants across the United States

Protecting Utilities

Federal, state and local agencies prioritize robust physical security plans for the nation’s electric power utilities. And they should. Any disruption in service from a primary provider could impact millions of people and businesses over a wide swath of the country.

Going the Extra Mile: Secure Recycle

Savers Thrift Superstores are all about offering great quality, gently used clothing, accessories, and household goods. With more than 300 locations in North America and Australia, security also is top of mind for company executives.



Can Zero Trust Be Trusted

It’s no surprise that cyber security defenses took their first cues from the physical world. Castles have moats. Your house has a door with a lock. It makes sense to protect your network with a firewall. But cyber criminals soon crashed that plane.

Virdee and SALTO Systems Partner to Deliver Contactless Arrival and Entry Solutions Across the Built Environment

Virdee, a SaaS company serving the lodging, multifamily and commercial real estate industries, has announced a partnership with SALTO Systems, a leading manufacturer of electronic access control solutions.

The New Normal, New Technology

I just can’t seem to get my arms around that phrase, “The New Normal.” I’m not sure why it bothers me so much, because how it see it … every day is a new day; every day something new is happening.

Improving Entrances with AI

Improving Entrances with AI

With the evolving dynamics of cloud storage and the ability to harness and proactively employ an ever-increasing pool of big data, AI in the form of machine learning and deep learning has become a disruptive technological force in the physical security industry.

Current Events and Macro Trends Offer Important Lessons for the Security Industry

As much as we focus on how technology trends affect the security industry, it’s also important to pay attention to broader global trends.

The Use of Technology

Customers and the public trust security firms to safeguard people, places and information. This trust is quickly destroyed when security staff commit a crime, which is often due to inadequately prescreening job candidates during the interview process.

Improving Emergency Response

Improving Emergency Response

Smart cities will need to grapple with the ongoing effects of the COVID-19 pandemic in 2021 while responding to natural disasters, such as the California wildfires and everyday emergencies.

See the Unseen

See the Unseen

Never before has thermal imaging technology been as widely discussed as it is today. While unfortunate for all of us, COVID-19 has cast light onto various thermal scanning technologies available to help prevent the spread of coronavirus by detecting people who may have elevated body temperatures.

A Safer Pathway to Camera and Sensor Maintenance

A Safer Pathway to Camera and Sensor Maintenance

The video cameras and sensors your business has invested in provide you with the protection you need to be safe as well as the information you need to keep operations running smoothly.

2021 Security Industry

To say that 2020 has been a challenge is an understatement. COVID-19 has created unprecedented circumstances that have upended life as we know it, and redefined what it means to be resilient in the ever-evolving security industry.

What is on the Horizon?

What is on the Horizon?

The security industry has a long history of pushing the technology envelope. Whether taking quantum leaps or building incrementally on past achievements, we’re in constant forward motion.

The Role of Security

The Role of Security

A key component of the healthy building ecosystem is security and access solutions. Security management systems offer solutions that organizations can deploy to increase building health. The good news is many facilities already have these controls in place and are well positioned to adapt the technology to meet current health and safety needs.

Holiday Security Tips for Malls or Outdoor Shopping Areas

Holiday Security Tips for Malls or Outdoor Shopping Areas

The holiday shopping season is here, let’s not forget that we are in COVID-19 pandemic and health officials continue to repeat their messages about the importance of masks, adequate social distancing, and frequent handwashing.

Republican Security Experts Seek Congressional Support to Push Trump Concession

Republican Security Experts Seek Congressional Support to Push Trump Concession

More than 100 Republican national security experts on Monday called on GOP congressional leaders to push President Donald Trump to concede the election to President-elect Joe Biden, according to the Washington Post. In a signed letter, the experts urged current GOP officeholders and Trump to prioritize the country's national security interests above politics.

Chinese-made routers, sold on Amazon and eBay, contain hidden backdoor and are being exploited by Mirai malware and other methods

CyberNews.com’s Investigations team today announced that they have identified hidden backdoors in Chinese-manufactured routers that share common firmware, with evidence that the routers are being exploited by the Mirai malware.

Protecting Businesses during Riots

Protecting Businesses during Riots

Since June, protests have been happening across the United States. As civil disobedience increases, law enforcement agencies will prepare for the possibility of protests across the country. The potential continuation of political unrest means private security professionals must also be prepared with a plan that is tactically sound and protective of people and property.

SnapAV Appoints David King as Security Business Development Manager

SnapAV has announced the appointment of David King to security business development manager for the Western United States.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3