top of page


Opinion: The Screening Problem Most Facilities Are Still Getting Wrong
Security directors are under more pressure than at any point in recent memory. Violence in healthcare settings is accelerating. Schools are operating under new legislative mandates with real enforcement mechanisms. Cultural institutions and public venues are contending with threat environments that would have seemed extreme a decade ago. The investment in physical security is following that pressure upward, and yet a significant number of facilities are still deploying techno

Peter Evans, CEO of Xtract One Technologies
7 days ago3 min read


Airports Have Become a Living Lab for AI Security
During the recent holidays, we traveled to visit my wife’s family in Romania, with a layover at Frankfurt Airport. While a transatlantic flight with a four-year-old can be challenging, for a security professional it was a fascinating journey. The amount of technology embedded in airports over the past few years is striking. Here are a few examples of how AI is being integrated into the most fundamental airport security tasks – watchlist alerting, sterile areas, baggage screen

Freddie Bolton
7 days ago4 min read


Portable Screening Gains Momentum as Fixed Checkpoints Show Their Limits
Security managers are increasingly questioning the limits of traditional fixed checkpoints. Recent incidents at schools, stadiums, and public meetings have underscored the vulnerabilities that appear during high-traffic transitions—morning arrival, dismissal, or pre-event surges—when static lanes create bottlenecks or miss risks altogether. In a written reply to Security Guys, Luca Cacioli, CEO of CEIA USA , said the demand is being driven by three forces: simplicity, mobilit

Ellie Goldman
Apr 22 min read


Rail Security Deal at Laredo Highlights Pressure on Border Screening Tech
Canadian Pacific Kansas City’s announcement with U.S. Customs and Border Protection to deploy advanced scanning equipment at the Laredo Rail Port of Entry is being framed as a breakthrough for secure trade. The company is providing a Vehicle and Cargo Inspection System Integrated Rail 6500 and a radiation portal monitor, technology meant to penetrate even dense shielding in railcars. CBP officials describe it as a way to facilitate lawful trade and travel, but the move raises

Paula Vettori
Apr 13 min read


Homeland Tech in Focus: Cell Towers, AI and Smart 911 Response
A fresh alarm has rung through U.S. government ranks: nearly two dozen FEMA IT personnel—including top CISOs—have been fired following a massive cybersecurity breach. The action was taken by DHS Secretary Kristi Noem, who blamed a failure to deploy basic safeguards like multifactor authentication. This stark reminder of systemic vulnerability throws homeland security tech providers into sharp relief—who they are, what they guard, and how they’re shaping resilience at the nati

Ellie Goldman
Mar 302 min read


K-12 Security Still Struggles With Fragmentation Despite New ANSI Standard
Schools in the United States face the same challenge year after year: how to keep campuses safe without turning them into fortresses. From physical access controls to behavioral threat assessments, districts are juggling budget gaps, political scrutiny, and community pushback over the right mix of measures. Into this landscape, ASIS International has released a new ANSI-approved school security standard, billed as the first comprehensive framework for K-12 in the U.S. The sta

Paula Vettori
Mar 302 min read


Cargo Theft Shifts From Opportunistic Crime to Structured, Data-Driven Attacks Across Global Supply Chains
Rising geopolitical fragmentation, persistent inflationary pressure, and continued volatility in global trade lanes are reshaping risk exposure across supply chains. High-value goods - particularly electronics, pharmaceuticals, and branded consumer products - are moving through longer, more complex networks, often with multiple handoffs across carriers, brokers, and facilities. At the same time, organized criminal networks are adapting, leveraging digital access, identity spo

Freddie Bolton
Mar 295 min read


The VMS Market Is Shifting - Is Genetec Losing Strategic Ground?
Updated: March 26, 08:02 The global video management systems VMS market is undergoing structural change. After years of consolidation around a relatively small group of dominant vendors, competitive differentiation is increasingly defined by openness, ecosystem breadth, cloud readiness and analytics integration. In this evolving landscape, long standing leaders are being reassessed as procurement priorities shift. Genetec built its reputation on unified security management. B

Freddie Bolton
Mar 263 min read


Opinion: Is the Market Ready for Advanced Detection?
Across schools, healthcare facilities, public venues, colleges & universities and more, security leaders are asking a similar question: not whether to strengthen screening, but how to do it without disrupting operations or public trust. The market signals are clear. Demand for advanced detection technology is rising, yet procurement decisions are becoming more disciplined. Buyers are pressing vendors on measurable outcomes, screening optimization, total cost of ownership and

Marilyn Thaxton, North America Marketing Manager at CEIA USA
Mar 263 min read


Enterprises Stress-Test Cloud Security Platforms As Hybrid Deployments Scale In 2026
As enterprises migrate physical security systems to the cloud, large-scale deployments are revealing the operational tradeoffs of hybrid infrastructure, third-party integrations, and multi-site performance management. While cloud-native platforms promise simplified management and AI-driven insights, execution at scale depends on how effectively vendors balance edge processing, bandwidth constraints, and real-time orchestration. In distributed enterprise environments, reliabil

Ellie Goldman
Mar 252 min read


Rising Antisemitism Drives Security Overhaul at Jewish Institutions
A sharp increase in antisemitic incidents following the escalation between Israel and Iran is forcing Jewish institutions to reassess how they secure facilities, manage access, and coordinate with law enforcement. Synagogues, schools, and community centers - traditionally designed to remain open and accessible - are now operating under sustained threat conditions that require structured, proactive security models. “I think what we’re seeing is a normalization of antisemitism

Freddie Bolton
Mar 233 min read


Open Security Tenders to Watch: Five Major Surveillance and Security Contracts Closing in the Months Ahead
Governments in the United States and Europe continue to push forward large procurement programs aimed at modernizing physical security infrastructure - from access control systems and surveillance networks to integrated alarm monitoring platforms. A review of current public procurement notices shows that many of these projects focus on replacing aging systems installed more than a decade ago. Others reflect heightened attention to protecting critical infrastructure such as en

Paula Vettori
Mar 214 min read


ISC West 2026: Industry Convenes in Las Vegas as Security Architecture and Cloud Adoption Take Center Stage
ISC West returns this week to Las Vegas as the security industry’s largest annual gathering, bringing together technology vendors, integrators, and enterprise buyers across physical security, identity management, and converged cyber-physical systems. As in previous years, the event serves as a primary launch platform for new products and architectural approaches, while also reflecting broader shifts in how organizations design, deploy, and operate security infrastructure. Thi

Paula Vettori
Mar 203 min read


From Cameras to Decisions: AI Video Analytics Is Reshaping Security Operations
For decades, the basic architecture of physical security remained largely unchanged. Cameras recorded footage, operators watched screens and incidents were investigated after the fact. Even in large security operations centers supervising hundreds or thousands of cameras, most systems still relied on motion alerts and manual review to determine whether something meaningful was happening. Artificial intelligence is beginning to change that model. Across enterprise security env

Sarah o'Neill
Mar 134 min read


Counter-UAS in the Real World: From Sensor Fusion to 90% Intercept Rates
As small, low-slow drones become cheaper, quieter, and more autonomous, the counter-UAS conversation has shifted from theory to operational reality. Critical infrastructure sites, defense facilities, and public venues are no longer asking whether they need layered airspace protection, but how to deploy it in cluttered, regulation-constrained environments without overwhelming operators with false alarms. The competitive counter-UAS landscape includes leading players such as An

Paula Vettori
Mar 64 min read


AI Video Monitoring Moves From Detection to Contextual Reasoning in Enterprise Security Operations
As enterprise security teams expand camera coverage across corporate campuses, healthcare facilities, schools, and critical infrastructure sites, the operational challenge is no longer raw detection. Motion flags, object recognition, and rule-based tripwires have been available for years. The constraint is signal quality. Excessive false positives, ambiguous alerts, and fragmented system handoffs continue to burden control rooms, inflate response costs, and erode operator tru

Paul Epstein
Mar 35 min read


Opinion: Closing the Edge Blind Spot - Why Physical Tamper Evidence Is the Missing Layer in IoT Security
The IoT Security Gap at the Edge, and Why Physical Tamper Evidence Matters In critical infrastructure, logistics yards, and distributed supply chains, the most dangerous IoT security weakness is often not a cloud breach. It is a blind spot at the edge, where an asset, gate, cabinet, cage, or container is opened, moved, or tampered with before anyone can verify what happened. That risk point is clear: delayed detection of unauthorized physical access. Many operators still rely

Shachar Rosiansky, VP t42
Feb 273 min read


BedSync Launch Amid Growing Emergency Preparedness Needs: Why Timely Capacity Reporting Matters Now
Juvare has put forward BedSync, a new tool meant to streamline hospital bed-capacity reporting to the CDC, framed as a timely aid for disaster readiness—but in practice, it raises important questions for preparedness professionals. Juvare, a global provider of emergency preparedness and response technology, unveiled this software on July 1, 2025. BedSync automates real-time, API-driven reporting from its EMResource platform directly to the CDC’s National Healthcare Safety Net

Sarah o'Neill
Feb 262 min read


From School Shootings to Stadium Safety: AI-Driven Screening Is the Next Layer of Physical Security
The new school year in the United States has opened with grim numbers: 47 shootings on K–12 grounds so far in 2025. That reality is driving districts to look for security measures that move faster than traditional checkpoints but avoid turning campuses into fortress-like spaces. Toronto-based Xtract One is one of the firms stepping into that demand. Its screening systems are designed to let students walk through carrying laptops and backpacks while software sorts routine item

Ellie Goldman
Feb 252 min read


Hospitals, Liability and AI: Athena Security Bets on Integrated Screening
Violence in healthcare facilities is on the rise. The Bureau of Labor Statistics identifies hospitals as having the highest rate of workplace violence, and the American Hospital Association estimates the annual cost of related incidents exceeds $18 billion. With California now requiring hospitals to install weapons detection systems by 2027, regulatory pressure is accelerating adoption. Athena Security is positioning itself as a beneficiary of that trend. Co-founder and CTO C

Paula Vettori
Feb 242 min read
bottom of page
