Retail Security


gun retailer

New Security, Video Surveillance Requirements For Illinois Gun Dealers Go Into Effect

The regulations originally required gun retailers to have a backup of all video surveillance feeds, but has since been changed.

porch package

Study: One in Four Americans Have Had Package Stolen By “Porch Pirates”

Nearly half of Americans don’t believe that delivery companies are doing enough to prevent theft, but the survey respondents also aren’t willing to change their online shopping habits.

christmas shopping

Don’t Let ‘Christmas Phishing’ Ruin Your Holiday Season

As shoppers try to find deals in time to put presents under the tree, phishing campaigns are making it more difficult for consumers to tell if a website is naughty or nice.

holiday mall

Are Seasonal Workers Putting Your Business Data at Risk?

The influx of temporary workers can often threaten data security for retailers. But it doesn't have to.

holiday shopping

Government Warns Shoppers of Rise in Counterfeit Retailers During Holiday Shopping Season

Officials have seen an increase of counterfeit goods being sold directly to customers as well as a rise in the use of the dark web.

auto manufacturer

FBI: Auto Industry Has Been Key Target of Cyber Attacks Since 2018

Auto companies are set to face a wider range of threats thanks to the rise of internet-connected vehicles, the FBI said in a recent report.

macy

Macy’s Customer Data Exposed After October Website Hack

The department store chain is notifying customers that hackers were able to scrape credit card data from online purchases for about a week.

Outback Steakhouse

New Computer Vision Program Being Tested at Outback Steakhouse Location

As restaurants find new ways to measure employee performance and increase customer satisfaction, security companies like Presto Vision are offering artificial intelligence as the solution.



best buy store

Family of Murder Victim Sues Best Buy, Delivery Companies For Poor Background Check Practices

Evelyn Udell was allegedly killed by a deliveryman employed by a Best Buy contractor. Her family says her death could have been prevented by better background checks.

Music Festivals Facing Pressure to Ban Facial Recognition From Venues

Music Festivals Facing Pressure to Ban Facial Recognition From Venues

Several festivals, including Bonnaroo and Austin City Limits, have said publicly that they are not currently using facial recognition at their events.

Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Hackers are targeting IT service providers as a means of attacking dozens of organizations at once and potentially reaping bigger financial rewards.

Walmart Will No Longer Sell Certain Ammunition or Allow Open Carry in Wake of Store Shootings

Walmart Will No Longer Sell Certain Ammunition or Allow Open Carry in Wake of Store Shootings

After shootings in El Paso, Texas and Southaven Mississippi, Walmart’s CEO says it will stop selling handguns completely and ask customers not to openly carry their firearms in stores.

How The Restaurant Industry Is Handling Renewed Active Shooter Threats

How The Restaurant Industry Is Handling Renewed Active Shooter Threats

More companies are rethinking their active shooter training programs and evaluating the financial risk of shootings at their locations.

detroit police car

Opposition to Government Use of Facial Recognition Technology Grows in Detroit

A recent public meeting exposed tensions about how a city-wide video surveillance system is being used to identify crime suspects in Detroit.

Exclusive Report Expects Rapid Growth for the Vehicle Access Control Market

Exclusive Report Expects Rapid Growth for the Vehicle Access Control Market

MarketsandMarkets says the worth of the vehicle access control market could reach $22.6 billion by 2027.

SmartTrucks offer video surveillance to commercial, governmental, and educational facilities

SmartTrucks Offer Video Surveillance to Facilities

Video surveillance is no longer stagnant. With new SmartTruck technology, IoT gives officials real-time, archivable coverage of facilities.

Secure Your Engines

Secure Your Engines

When this upgrade project began in early 2017, there was a mix of standard-resolution legacy video cameras scattered throughout the facilities.

3 Key Ways You Can Use Physical Security to Mitigate the Threat of Organized Retail Theft

3 Key Ways You Can Use Physical Security to Mitigate the Threat of Organized Retail Theft

According to a National Retail Federation survey, retailers in the US alone lose almost $50 billion to theft every year.

Securing High-End Retail Stores

Securing High-End Retail Stores

It’s no secret Americans like to shop online. A marketing survey showed 40 percent of U.S. internet users made purchases several times a month in 2017.

Fraud Attempts Expected to Spike During Holiday Shopping Season

Fraud Attempts Expected to Spike During Holiday Shopping Season

Beware holiday shoppers. Attempts at fraud will peak on Thanksgiving Day this year.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3