MAY/JUNE 2025

Retail Security Special Issue

More content from MAY/JUNE 2025

Credit: Shutter2U
A recent Gartner report projects the Digital Twin market to grow from $35 billion in 2024 to $379 billion in 2034, representing a 900% increase over the coming decade.
Zero Trust unlocks the data integrity and confidence that delivers the promise of AI to electronic and physical security systems.
June 24, 2025
Credit: AndreyPopov
At its core, predictive analytics uses historical data, behavioral trends, and machine learning to forecast likely security incidents or operational disruptions.
Predictive analytics is transforming security operations—giving leaders time to act, context to decide, and the foresight to anticipate what’s next in an unpredictable risk environment...
June 24, 2025
DoorKing commercial gates serve a security and safety function.
DoorKing experts examine how automated gate systems, crash barriers, and entry technologies are evolving to meet the demands of modern security.
June 24, 2025
Credit: MTStock Studio
Phishing is one of the most common and easily executed cyberattacks. Almost everyone with an email address or a mobile device has encountered a phishing scam before.
Social engineering remains one of the easiest ways for cybercriminals to penetrate enterprise defenses; however, trained employees can disrupt the modern kill chain before it ...
June 24, 2025
Credit: Harsa Maduranga
Security operations must adapt to modern challenges, integrating AI and cybersecurity to improve real-time decision-making, reduce response times, and enhance overall efficiency.
From smart surveillance and autonomous responses to humanoid patrols and predictive analytics, AI transforms perimeter security into a proactive, cost-efficient, and cyber-resilient...
June 24, 2025
Credit: Wirestock
gettyimages1442107515
I remember conversations with loss prevention directors in the 1980s and throughout the 90s where stories were shared of bizarre methods for stealing merchandise, gaming POS systems...
June 24, 2025
Credit: sasha85ru
Physical security professionals need not be Zero Trust experts but should advocate for it, defining their systems’ overall network design and usage.
Intelligent physical security system devices—especially AI-enabled video cameras—have become high-value targets for hackers, who now deploy malware explicitly designed...
June 24, 2025
Credit: Alexander Farnsworth
When I recommend to my clients that they stock and train the application of Narcan, their kneejerk response is: “That does not happen in workplaces, so we can’t deploy Narcan!
Not just in the streets and neighborhoods, but in workplaces like yours across the nation.
June 24, 2025
Credit:Daniel Balakov
When you establish a great morning routine, you give yourself an edge to take on the day and succeed.
How does your typical day begin? If you are like most people, it starts with you picking up your smartphone as soon as you wake up. You start looking at emails and text messages...
June 24, 2025
Credit: Leila Melhado
Crime Prevention Through Environmental Design (CPTED) is the use of landscaping to protect the surrounding environment from crime.
If you’ve ever lived on the corner of a busy urban street, you’ve most likely considered the possibility of a car crashing through your property. And if so, you probably...
June 24, 2025
Credit: pchoui
gettyimages658631542
This week has seen my social media interactions explode with all the postings and podcasts from the 2025 RSA Conference, held annually in San Francisco. It is also the fifth anniversary...
June 24, 2025