The increasing digitalisation of physical access systems is fundamentally changing the security architecture of companies, public institutions and critical infrastructures. Access control is no longer organised exclusively on a mechanical or local basis, but is now...
Trust seal for data centres in the Middle East
BSI establishes global standard for security, availability and sustainability Data centre boom calls for new trust mechanisms The global expansion of data centres is accelerating rapidly. Artificial intelligence, cloud computing and data-intensive applications are...
Apstec launches Merlin contactless metal screening system
Apstec Systems, a provider specialising in security screening, presented its new AI-powered metal detection system, Apstec Merlin, at the Intersec trade fair in Dubai. The solution sets new standards in non-invasive personnel screening and enables precise...
Morse Watchmans presents the latest developments in the Keywatcher system
Morse Watchmans, a leading provider of electronic key and asset management solutions, presented the latest generation of its Keywatcher system at the Intersec security trade fair in Dubai. The completely redesigned system offers users significantly more flexibility by...
AI-supported visual weapon detection in Europe
Technical architecture, regulatory classification and potential applications in the security context The growing debate surrounding preventive security technologies in public and semi-public spaces is also bringing AI-supported video analysis into focus in Europe....
Fake dating app serves as spying tool
Current campaign shows how effective social manipulation is Online dating is a popular hunting ground for cybercriminals. Security researchers at ESET have now uncovered a digital romance scam in Pakistan that is completely new in this form. Hackers use a manipulated...
Data Privacy Day 2026: Data protection through AI more relevant than ever
Chris Harris, EMEA Technical Director, Data and Application Security at Thales Most data breaches today are not caused by hackers. They take place quietly within IT systems. Although the findings of the Thales Data Threat Report show that the number of reported data...
Optex: White paper: Tunnel safety
Tunnels are crucial for Europe’s transport, moving people and goods, housing communications, and supporting the economy. Increasingly long, deep, and complex tunnels—such as the UK’s HS2, the Brenner Base Tunnel, and Norway’s Scandinavian subsea tunnel—require...
Unifying wireless digital locks and smart key access gives security managers much more control
Sometimes a digital system cannot cover all the openings an organization needs. Readers, escutcheons and security locks can equip many doors. But what if they also want to deploy intelligent key-operated locking for alarm boxes, medicine stores, server rooms or power...
CMI Tech: EF-70 – Combined iris and facial recognition terminal
The EF-70 terminal offers fast, contactless registration and authentication and is ideal for government ID management systems and advanced access control applications. Extended capture range for maximum user-friendliness The EF-70's iris recognition works reliably at...



