| | | | | | By Brian Beideman From perimeter barriers to high security portals, a layered access control strategy enables critical infrastructure operators to protect sensitive areas while maintaining operational efficiency. |
|
|
|
| |
|
|
|
| | | | The partnership makes COPS the first wholesale monitoring center to deliver RelyOn’s AI-powered mobile safety platform nationwide, enabling security providers to generate recurring revenue without added hardware or installations |
|
|
| | CTA’s new CTA-2142 initiative aims to establish use cases, performance requirements and testing methodologies for fall detection technologies designed for everyday, non-clinical use. |
|
|
| | The latest Security Market Index from the Security Industry Association shows improved current conditions and strong near term expectations among security executives to begin the year. |
|
|
| | Threat intelligence firm SOCRadar identified the publicly accessible Elasticsearch instance, which it said held indexed U.S. identity records — including full SSNs — and classified the exposure as critical due to its scale and searchable structure. |
|
|
| | The deal for Sennco adds U.S.-based anti-theft and asset protection expertise to ASSA ABLOY’s Global Solutions Retail business area and is expected to be accretive to earnings per share. |
|
|
| | The Security Industry Association has released a new Corporate Credential Design Guide aimed at helping organizations strengthen security, improve interoperability and standardize corporate ID credential programs. |
|
|
| | The acquisition adds nationwide guarding and executive protection services to Knightscope’s technology portfolio as the company advances its strategy to deliver integrated, outcome-based security under a single managed platform. |
|
|
|
| |
|
|
|
| | | | BEST OF SECURITY BUSINESS |
| | |
| | Ring’s new mobile surveillance trailers and panoramic cameras send shockwaves through the security industry. |
|
|
|
| |
|
|
|
| | Sponsored | | AI is redefining perimeter security as drones turn the airspace into a new frontline—forcing organizations to rethink what it truly means to defend the edge. This session explores how AI-driven sensing, analytics, and counter-UAS technologies are converging to deliver real-time, multidimensional protection across air, ground, and digital domains. |
|
|
Sponsored | | As cyber, physical, and cloud boundaries disappear, security is being redefined by convergence rather than control. This panel unpacks how leaders can turn fragmentation into unified resilience—aligning technology, operations, and governance to protect what matters most. |
|
|
| | The latest episode of the Security DNA Podcast features Dr. John D. Byrnes, founder and CEO of the Center for Aggression Management. |
|
|
| | i-PRO IT/Cyber Director Will Knehr discusses how threat actors can hack cameras to breach networks, why AI is becoming another attack vector, and what “ethical hacking” can do to harden your security systems. |
|
|
| | Global Security Exchange (GSX) 2026 will take place Sept. 14-16, 2026, at the Georgia World Congress Center in Atlanta. Produced by ASIS International, the annual conference and trade show brings together global security professionals for education, certification-eligible programming, strategic networking and hands-on exposure to technologies and solutions... |
|
|
| | ISC West is the leading comprehensive and converged security trade event in the U.S. |
|
|
|
| |
|
|
|
| | |
|
| | |
|