Recent Articles
The IoT revolution is transforming physical security for the connected age
The commercial sector has been more cautious in adopting an IoT approach to systems, but momentum is building. The Internet of Things (IoT) has become deeply woven into the fabric of our daily lives. From smart speakers that dim our...
The evolution of edge computing in security
From single devices to comprehensive solutions, physical security systems are network-centric and require due diligence when implementing. The security industry stands at a technological crossroads where the promise of edge computing is transforming how we process and analyze data from...

Over half of organizations cite technical debt as top hurdle to identity system modernization
The Cloud Security Alliance’s report also found that over 75% of enterprises are using two or more IDPs and struggle to manage access controls and consistent security policies. Modernizing identity systems is proving difficult for organizations due to two key...