Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & Solutions

Adapting to Emerging Threats: What’s Next for Security Screening Technology?

By Frank Baldwin
facialrecognition
May 24, 2019

Increasing threat levels and advancements in technology mean the security landscape is constantly evolving. Every high-profile incident over the years, from hijackings to bombings, has brought new intelligence to light about the motives and methods of attackers – which has helped shape the technology we see today.

When a bomb hidden in a cassette player destroyed a plane in the 1988 Lockerbie air disaster, 100 per cent hold baggage screening was consequently rolled out. And airport security measures were ramped up considerably worldwide following the 9/11 attacks in 2001.

But it’s not just the incidents that involve severe damage to infrastructure or significant fatalities that are having an impact on security; plots, failed attempts and even pranks are also shaping subsequent security measures. 

Just look at the drone sightings which brought Gatwick to a standstill over the 2018 Christmas period and temporarily halted Heathrow flights at the start of 2019. As a result, bosses at both airports have now invested millions in military-grade anti-drone technology in order to prevent future attacks and threats to operational safety.
 
Evolving targets
If there’s one thing that’s become apparent over recent years, it’s that terrorists are no longer just targeting critical infrastructure. Now more than ever, there is a greater focus on civilians. Which is why ‘soft targets’ such as arenas, concert venues, stadiums and hotels are becoming increasingly common targets.

Venues such as these, where large crowds gather, present a number of challenges when it comes to conducting rapid security screening without compromising safety. Equally, entertainment and hospitality events such as red-carpet premieres also call for heightened security which is both highly effective and efficient so as to avoid disrupting the main event.

As the threat level grows, these environments increasingly require advanced security screening solutions which are rapidly deployable and non-obtrusive – and which can be used in a range of different scenarios, enabling large volumes of people and vehicles to be checked swiftly yet thoroughly.

Ease of transportation and installation is also essential in these high-risk settings to ensure the security zone can be set up a safe distance away from the event or venue perimeter, without the need for specialist equipment or personnel.
 
Looking ahead

Artificial intelligence (AI) has long been seen as a bit of a fad, but technological developments mean it is becoming more of a reality – particularly in the security sector. For example, machine learning techniques are helping to automatically identify concealed threats, enabling real-time screening as scanners quickly ‘learn’ the difference between prohibited and ordinary items. Picking up explosives and firearms while ignoring non-dangerous items such as keys and belt buckles which users may be carrying.

This means items that previously needed to be scanned separately, such as laptops or phones, can be kept in bags or on the person as they pass through security checkpoints – helping to reduce the risk of inconvenient false alarms which slow down the screening process.

Crucially, these AI systems also improve as more and more information is fed into them – meaning the technology will only become more advanced and prominent within scanning technology in the future. As such, the next few years will undoubtedly see an increase in these types of technologies as companies continue to expand their product portfolios with innovative solutions that draw on the latest AI developments to meet the evolving demands of the security screening industry.

KEYWORDS: cybersecurity drones facial recognition machine learning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Frankbaldwin

An experienced entrepreneur, Frank Baldwin has a passion for building businesses and challenging the status quo. With a 30-year track record and the Queen’s Award for Enterprise, he has gained extensive knowledge of the x-ray security market and has worked with some of the most innovative and progressive companies in the sector. Today, he continues to be an active figure within the sector, advising organizations on the purchase and deployment of security equipment. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • US Customs and Border Patrol

    How has COVID-19 hindered security efforts?

    See More
  • world map

    Stemming Outbreaks of Violence in South Africa

    See More
  • Michael Chertoff Security Magazine October 2017

    Over the Horizon: Emerging Security Threats and Risks to the Enterprise

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing