Yitao / iStock / Getty Images Plus
Iran’s cyber campaign against U.S. operational technology is the activation of a threat that has been building for years. Security integrators and consultants have a central role in what happens next.
Iran’s cyber campaign against U.S. operational technology is the activation of a threat that has been building for years. Security integrators and consultants have a central role...
Sign up for our eNewsletters
Get the latest news and updates
The awards ceremony will take place June 4 during ESX 2026.
The Foundation for Advancing Security Talent recognized 10 technicians for technical expertise, leadership and customer service ahead of the ESX 2026 awards presentation in June...
May 15, 2026
Perimeter PREVENT 2026 will bring together security leaders, government officials and technology providers to discuss evolving approaches to securing critical infrastructure and high-risk facilities.
The June 24 conference in Washington, D.C., will feature retired Gen. William J. Walker and industry experts discussing emerging technologies and strategies for protecting critical...
May 14, 2026
Image by Mohammed Mohammed from Pixabay
The Canvas cyberattack has intensified scrutiny around how educational institutions protect student data and respond to extortion-driven security incidents targeting cloud-based learning platforms.
Instructure said it reached an agreement with the ShinyHunters hacking group following the recent Canvas breach that disrupted educational institutions during finals season and...
May 13, 2026
Retail security and asset protection professionals will gather at NRF PROTECT 2026, taking place June 8-10 in Grapevine, Texas, where the National Retail Federation will present its annual Ring of Excellence Awards.
The annual Ring of Excellence Award highlights executives and investigators whose work helped shape modern retail safety, profit protection and organized retail crime prevention...
May 13, 2026
https://securityleadher.org/2026/05/08/2026-security-leadher-program-to-advance-connect-and-empower-women-in-security/
ASIS International and SIA announced the 2026 Security LeadHER conference agenda and speaker lineup for the June event in Minneapolis.
ASIS International and SIA unveiled the 2026 Security LeadHER agenda, featuring keynote speakers, networking opportunities and leadership discussions focused on advancing women...
May 12, 2026
An Axon survey found retail and healthcare organizations are increasingly prioritizing integrated security technologies as operational disruptions and workplace safety concerns continue to rise.
A new Axon survey of retail and healthcare security leaders found rising operational disruptions are driving increased investment in workplace safety technologies and integrated...
May 11, 2026
screenshot_20260506_164432
Security DNA
A deadly shooting at Brown University is exposing critical gaps in campus surveillance strategies and accelerating the shift toward real-time, AI-driven security systems.
May 6, 2026
Allied Universal CEO Steve Jones recognized for leadership and innovation in security and facility services.
Allied Universal CEO Steve Jones earns top industry honors as the company gains national recognition for innovation and growth.
May 5, 2026
artiemedvedev / iStock / Getty Images Plus
'The statutory changes made by the Safer Skies Act, coupled with the $500 million infusion of capital in 2026 and 2027 from FEMA to support World Cup counter-UAS activities, are nothing short of transformational for the entire drone and counter-drone ecosystem.'
Legislation creates a massive opportunity for integrators working with law enforcement and correctional clients
May 15, 2026
Paul F. Benne is a 37-year veteran in the protective services industry. He is President of Sentinel Consulting LLC, a security consulting and design firm in based in New York City. Connect with him via LinkedIn at www.linkedin.com/in/paulbenne or visit www.sentinelgroup.us
The access control credential standard is spurring the shift in philosophy from closed methods to open, identity-centric trust models.
May 15, 2026
With a career spanning nearly every role in the life safety industry and a NICET Level IV certification, Ben Adams is a sought-after author and speaker. In 2020, he founded Field Sim to accelerate training for companies, shrinking time-to-value for new techs from months to just days. Most of his columns are excerpted from Fire Alarm 101 training content, which can be found at https://training.fieldsim.com.
Securing fire alarm devices requires a closer look at Chapter 11 of NFPA 72
May 15, 2026
Chris Peterson is the founder and president of Vector Firm, a sales consulting and training company built specifically for the security industry. Use “Security Business” as a coupon code to receive a 10% lifetime discount at the Vector Firm Academy. www.vectorfirmacademy.com • (321) 439-3025
The first step is teaching your technical customer-facing employees the best ways to communicate.
May 15, 2026
bigbook1
The security industry's buyer's guide, featuring new products in 8 different categories
May 15, 2026
https://www.prnewswire.com/news-releases/verkada-expands-ai-powered-physical-security-platform-with-next-generation-cameras-access-control-and-enhanced-detection-capabilities-302765932.html
Verkada introduced new third-generation bullet cameras, expanded AI-powered alerts and next-generation access control solutions as part of a broad platform update.
Verkada expanded its physical security platform with new AI-powered cameras, advanced detection tools, updated emergency response functionality and healthcare-focused visitor ...
May 12, 2026
Axis Communications’ new Experience Center at One Campus Martius in Detroit provides a hands-on environment for exploring integrated security and business intelligence solutions.
Axis Communications expands its Americas footprint with the opening of its 20th Experience Center in Detroit, offering a collaborative space for hands-on exploration of intelligent...
April 30, 2026
2137videoentrymain_copy
Designed for modern multi-tenant and commercial environments.
April 29, 2026
Genetec is encouraging organizations to adopt stronger credential governance and identity management practices to defend connected physical security systems against evolving AI-driven cyber threats.
Genetec is urging organizations to strengthen credential governance and identity management practices as AI-driven cyber threats increasingly target connected physical security...
May 14, 2026
Vingcard expanded its New York hospitality technology presence through ASSA ABLOY’s acquisition of GESI Hospitality.
Vingcard has expanded its New York hospitality technology operations through the acquisition of access control specialist GESI Hospitality.
May 7, 2026
The Lockly Visage smart lock combines facial recognition, biometric authentication and Apple Home compatibility in the company’s new Zeno Series lineup.
Lockly has introduced the Lockly Visage smart lock, the company’s first model to feature facial recognition technology for hands-free door unlocking. Priced at $350, the...
May 7, 2026
ABLOY CUMULUS platform enables centralized, connected access control for distributed critical infrastructure sites.
ALCEA rebrands ABLOY BEAT to ABLOY CUMULUS as it expands from keyless hardware to a connected access management platform.
May 5, 2026
Credit: shulz
The attack surface is expanding across multiple dimensions at once. More systems, integrations, permissions, and automated actions are happening continuously in the background.
As artificial intelligence accelerates software development, automation, and decision-making, it is also rapidly expanding the enterprise attack surface. Security leaders who ...
April 27, 2026
Credit: SOMKID THONGDEE
Many mid-market organizations lack a formal CISO role, leaving AI-related decisions and experiments to IT directors or operations leaders who are already responsible for infrastructure, vendor management, and day-to-day security oversight. In these environments, experimentation without structure can quickly create more operational strain than efficiency.
After years of failed pilots and experimental hype, mid-sized organizations are shifting to focused, outcome-driven AI strategies. By starting small, proving ROI quickly, and ...
April 27, 2026
Credit: Isara Methong
If a cybersecurity framework is a collection of outdated subscriptions, the subscription manager is an audit using domain name system (DNS) intelligence. DNS data not only helps weed out potential attack vectors but also provides AI systems with high-quality data to preemptively take down threat actors.
By tapping into DNS intelligence, organizations can gain full-spectrum visibility into connected assets, reduce hidden attack surfaces, and arm AI-driven defenses with the real...
April 22, 2026
Jacob Wackerhausen / via iStock / Getty Images Plus
AI-powered agents are rewriting the rules of systems integration — and this time, the power belongs to the integrator.
Autonomous AI agents are handing systems integrators a capability that vendors never could: the power to roll your own multi-vendor integrations at virtually no cost.
April 21, 2026
tim_freestone
Security DNA
Drawing on Kiteworks research, Tim Freestone warns that organizations racing to adopt agentic AI without proper governance and control are exposing themselves to significant security...
April 15, 2026
artorias
Security DNA
Artorias co-founder Stefano Ritondale breaks down the intelligence failures that left enterprise security teams flat-footed, and why AI-driven OSINT is no longer optional.
March 18, 2026
secureframeimage
Security DNA
The latest SecurityDNA podcast episode unpacks the sweeping rollout of FedRAMP 20X and CMMC 2.0, revealing why tens of thousands of defense contractors may be unprepared for fast...
March 18, 2026
vlcsnap2026012810h45m53s446
Security DNA
The latest episode of the Security DNA Podcast features Dr. John D. Byrnes, founder and CEO of the Center for Aggression Management.
Jan. 28, 2026
dreamstime_xxl_432419751
Sponsored
Resilient by Design reimagines security as a living, adaptive ecosystem—shifting from static defenses to identity-centric, breach-assumed operations that prioritize speed, visibility...
June 17, 2026
dreamstime_xxl_162922042
Sponsored
Executive protection is no longer just about physical security—it’s a dynamic, intelligence-driven discipline shaped by political volatility, cyber threats, and the rapid amplification...
May 14, 2026
dreamstime_xxl_213699973
Sponsored
AI is rapidly transforming security from reactive monitoring to proactive threat prevention, using real-time video analytics to detect risks before they escalate. But as predictive...
June 3, 2026
webchat_header_image_endeavor_1300x565
Sponsored
Join this live session to uncover the true cost of theft and learn how to identify vulnerabilities and move to a proactive, deterrence-first approach. Register today to protect...
May 19, 2026
lumanabuyers_guide_image
Sponsored
Stop chasing false alarms and start acting on verified threats. Discover how to choose an AI gun detection platform that delivers real-time, actionable intelligence to protect...
April 21, 2026
lumanaevaulating_ai_image
Sponsored
This comprehensive guide provides a strategic roadmap for organizations looking to move beyond traditional, reactive CCTV and basic cloud-based cameras. It identifies the 10 critical...
April 21, 2026
mer_24053_security_infowatch_nov_1540x800_1
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in our White Paper.
Jan. 29, 2026
mer_24053_security_infowatch_nov_1540x800
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in our White Paper.
Nov. 3, 2025
NAPCO highlights its new MVP Cloud-Based Access Control Platform at ISC West 2026
At ISC West 2026, SecurityInfoWatch interviews Napco Security Technologies’ Rob Etmans, Director of Sales, focusing on how the company’s MVP Access cloud platform is helping dealers...
March 31, 2026
Prometheus exec explains the complications when physical and cybersecurity come together
At ISC West 2026, SecurityInfoWatch interviews PSG’s Jeremy Freeze-Skret, VP of Engineering, focusing on the convergence of cyber and physical security and how organizations are...
March 31, 2026
Live from the Traka booth at ISC West 2026!
At ISC West 2026, SecurityInfoWatch interviews TRAKA Technical Director Hector Melendez, focusing on trends in electronic key management and the role of intelligent key cabinets...
March 31, 2026
Schlage embraces the mobile credential evolution at ISC West 2026
At ISC West 2026, SecurityInfoWatch interviews Olivia Renaud from Allegion, focusing on the evolution of wallet-based mobile credentials, the impact of their partnership, and ...
March 31, 2026