Latest Updates
How Not Deploying Zero Trust Data with AI May Risk Team Safety, Mission Failure
March 21, 2025As AI transforms threat detection and response, securing the data that powers it is critical. The Skinny Prologue: A critical component of next-generation security is the adoption of Zero Trust Architecture (ZTA) for physical security equipment (PSE) and Operational Technology (OT)...
How FIDO Can Safeguard Against Advanced Cyber Threats
March 14, 2025Now is the time for organizations to evaluate their authentication strategies proactively. The Skinny Recent high-profile security incidents have spotlighted how traditional password-based systems remain vulnerable to attacks. For instance, last year, hackers compromised user accounts at a well-known genetic...
Inside HID’s 2025 security report: Trends shaping access and identity
March 7, 2025We explore key trends from HID Global’s 2025 State of Security and Identity report, with additional insights from Memoori Senior IoT Research Associate Owen Kell, on the future of access control, biometrics, AI and interoperability in security. The Skinny: HID...
The right questions to ask prospective identity governance vendors
February 14, 2025Discover how asking the right questions can help IT decision-makers navigate the complex landscape of security solutions and select the best vendor for their needs. As an IT decision-maker, navigating the vast array of security solutions on the market can...
How to overcome key physical security public relations challenges
January 31, 2025The top 10 public relations challenges faced by physical security companies and solutions for each. As America’s domestic and foreign physical risks continue to evolve in 2025, businesses and government departments must invest in new security services and solutions to...
Why supporting a modern IoT platform in physical security is vital
January 17, 2025With modern IoT platform support, physical security OEMs can improve customer satisfaction and lower costs. IoT is synonymous with integrating technology into once-static elements, enabling new efficiencies and endless possibilities for business and societal growth. As a result, the IoT...
Advanced AI for data-driven security operations
January 3, 2025AI-enabled guarding and guard force management achieve breakthrough capabilities in physical security operations. For years, I’ve been writing about how the physical security industry lags behind IT by five to 15 years. But for the first time, that gap is...
AI and Access Control, Perfect Together?
December 13, 2024Rob Rowe, the head of the HID AI Lab, shares his valuable insights and cautious perspectives as the security industry continues to harness AI’s potential Integrating artificial intelligence (AI) into security systems is a journey filled with optimism for its...
Mobilizing the future of access control
December 6, 2024Industry experts talk about challenges, best practices, and the future of mobile credentialing at ISC East 2024. Skyrocketing innovation in mobile credentialing is redefining access control for organizations, integrators, and end users. As Bluetooth-based systems give way to near-field communications...