Sign up for our eNewsletters
Get the latest news and updates
sandyjonesaward
Daniel Reichman and Mark Schreiber will be recognized at ISC West as the Security Industry Association’s 2026 Sandy Jones Volunteers of the Year for their leadership and volunteer...
Feb. 12, 2026
Vosker's acquisition of Reconeyez combines remote monitoring technology with AI-powered autonomous surveillance systems for enterprise and government deployments worldwide.
Vosker expands its global footprint and B2B channel strategy through the acquisition of Reconeyez and a newly secured $200 million senior debt financing package.
Feb. 11, 2026
Paul Rothman
Andrew Elvish, VP of Global Marketing for Genetec, presents findings from the company’s State of the Physical Security Industry Report during the Global Press Summit ’26 in Montreal.
Andrew Elvish, VP of Global Marketing for Genetec, pointed to accelerating hybrid cloud adoption and a continued cybersecurity awareness gap between IT and physical security professiona...
Feb. 11, 2026
Credit: Tinpixels
While high-profile attacks have elevated cybersecurity’s prominence in the C-suite, the report indicates that many CISOs must expand their comfort zones into emerging risk domains to stay ahead of evolving adversaries.
New research finds most CISOs see themselves as business enablers, yet only half feel prepared for AI-driven threats, and few prioritize software supply chain visibility.
Feb. 11, 2026
extrahop
New identity integrations, Kubernetes visibility and query capabilities aim to close context gaps for AI-driven security teams
Feb. 12, 2026
Credit: Orbon Alija
Building a cloud architecture that assumes an attack will never happen is no longer optional. Prevention-first design, zero-trust enforcement, and operational readiness are essential for securing modern workloads
To survive the modern threat landscape, enterprises must move beyond reactive "detect-and-respond" models and build cloud environments that assume breach and prioritize proactive...
Feb. 4, 2026
Credit: brightstars
Looker is used by more than 60,000 organizations across 195 countries, often serving as a centralized analytics layer connected to an enterprise’s most sensitive databases. According to Tenable, that central role dramatically magnifies the potential impact of exploitation—particularly for organizations running customer-hosted or on-premises Looker instances, which are not automatically protected by Google’s cloud-side patches.
Critical remote code execution and database theft flaws highlight patching gaps and the hidden risk inside business intelligence platforms
Feb. 4, 2026
Joseph C. Pipczynski Jr. brings more than four decades of leadership experience across sales, business development and global market expansion to NAPCO’s executive team.
The newly created executive role is intended to support NAPCO’s growth initiatives and expanding recurring revenue strategy as the company advances its access and locking solutions...
Feb. 3, 2026
Image via facebook.com/VerkadaHQ
Leaders from several national and regional integration firms were honored for contributions spanning marketing execution, technical deployment and customer engagement within Verkada’s partner ecosystem. Above, attendees gather at 2025 VerkadaOne in Chicago, Verkada’s annual conference for customers and channel partners.
Verkada recognized eight channel partners during its annual Sales Kickoff, citing performance across marketing, growth, technical execution and customer engagement categories....
Feb. 13, 2026
rothman_new_headshot3
SIA’s most impactful Megatrend reflects a fast-changing business model for enterprise integration companies.
Feb. 13, 2026
Jon Polly is the Chief Solutions Officer for ProTecht Solutions Partners (www.protechtsolutionspartners.com), , a security technology consulting firm that works with smart cities and corporations to bring business intelligence and public safety through security IoT applications. He has worked as a Project Manager and System Designer for City-Wide surveillance and Transportation camera projects in Raleigh and Charlotte, N.C.; Charleston, S.C.; and Washington, D.C. He is certified in Critical Chain Project Management (IC3PM) by the International Supply Chain Education Alliance (ISCEA). • (704) 759-6837
A communications technology born in the oil and gas industry may be the key to simplifying the security integration process.
Feb. 13, 2026
joseph_ryan
The qualities that separate reliable employees from game-changers.
Feb. 13, 2026
Paul Rothman
ring1
Ring’s new mobile surveillance trailers and panoramic cameras send shockwaves through the security industry.
Feb. 13, 2026
Eyeo’s sensor architecture replaces both the color filters and microlenses found on current image sensors. When light enters the sensor, it hits a collection funnel that channels photons into a vertical waveguide. Inside the waveguide, the light splits into different colors, which are then injected into adjacent pixels. “Then, at the output, we inject different colors into the pixels,” Hoet explains. “This way, we don’t filter any light, but we split and guide the light into the pixel.”
The company’s nanophotonic color-splitting technology aims to triple image sensor light sensitivity at the hardware level, enabling sharper images in all lighting conditions without...
Feb. 13, 2026
Photos: Paul Rothman
At CES Eureka Park, Paul Rothman and Pierre Bourgeix encountered an entrepreneur promoting a license plate frame that could be toggled remotely (via app) to completely obscure a license plate so it cannot be read at all.
While you may have seen ghost plates on the CES show floor, don’t expect to use them legally in most states.
Feb. 13, 2026
The integration connects Speco Blue Series cameras and recorders with the Manitou alarm monitoring platform to support event-based actions and centralized video management for monitoring operators.
Speco Technologies will integrate its Blue Series video products with Bold Group’s Manitou platform in March 2026, giving monitoring centers direct access to live video, alarm...
Feb. 12, 2026
Photo: Paul Rothman
Gemns (formerly WePower) demoed its energy harvesting technology embedded in a Southco lock. The company aims to use this technology to eventually eliminate batteries in a wide range of devices relevant to the security and smart home markets.
Smart lock manufacturers target integration opportunities in several vertical markets, leading with technology innovation in power generation, biometrics, and more.
Feb. 13, 2026
Photo: Doma
Doma reunites Yves Behar (left) and Jason Johnson, creators of the smart lock brand August Home, who sold the brand to ASSA ABLOY in 2018.
At CES, the founders of August Home unveiled Doma, which aims to transform doors into motorized units with embedded smart lock, video doorbell, and more.
Feb. 13, 2026
Versa Director with Verbo, Versa’s AI-powered co-pilot, provides conversational visibility into system health and operational status. The interface illustrates how AI enhances observability and troubleshooting by surfacing real-time insights without requiring manual navigation across dashboards.
New release targets secure, scalable enterprise AI deployments across distributed environments without added complexity
Feb. 10, 2026
Electromechanical and access-related solutions remained a key contributor to ASSA ABLOY’s results.
ASSA ABLOY’s Q4 performance reflects growing reliance on technology-led security solutions, non-residential demand and targeted acquisitions amid uneven global markets.
Feb. 10, 2026
Ouster completed its acquisition of StereoLabs SAS in early February, adding the AI vision company as a wholly owned subsidiary.
Ouster said the acquisition of StereoLabs SAS combines lidar, AI vision and perception software into a single sensing platform aimed at Physical AI applications across multiple...
Feb. 10, 2026
sumo_logic_inc___logo
The 2026 Security Operations Insights report shows that fragmented tech stacks, limited SIEM scalability, and misaligned AI adoption are undermining enterprise security performance...
Jan. 28, 2026
Daniel Balakov / E+ via Getty Images
Security teams increasingly rely on behavioral signals to detect abnormal activity as AI systems operate inside enterprise workflows.
As autonomous and unsanctioned AI tools spread across enterprise workflows, security leaders are being forced to rethink insider risk through the lens of behavior rather than ...
Jan. 21, 2026
kiteworks_logo
Kiteworks’ 2026 data security forecast finds widespread gaps in audit trails, data visibility, and centralized governance as regulatory scrutiny and AI adoption intensify.
Jan. 21, 2026
vlcsnap2026012810h45m53s446
The latest episode of the Security DNA Podcast features Dr. John D. Byrnes, founder and CEO of the Center for Aggression Management.
Jan. 28, 2026
Redefining Security in 2025 Part 1: Breaking Leadership Barriers with GMR CEO Mary Gates
Mary Gates discusses the GMR Security Consulting Group rebrand, the rise of human-centric security strategies, and the unique strengths female security leaders bring to the table...
Nov. 5, 2025
russpodintrocard
Russ Munisteri discusses the evolving landscape of cybersecurity, the challenges facing cyber workforce development, and the critical role of training in defending against today...
Oct. 22, 2025
taradunningpodintrocard
Wesco's Tara Dunning explores how AI, IoT, and cloud technologies are transforming the role of today’s security integrators.
Oct. 8, 2025
dreamstime_xxl_41006614
Sponsored
Physical security is shedding its siloed past, evolving into a unified, intelligence-driven platform that connects identity, access, and real-time analytics. As access control...
April 8, 2026
dreamstime_xxl_119260737
Sponsored
AI is redefining perimeter security as drones turn the airspace into a new frontline—forcing organizations to rethink what it truly means to defend the edge. This session explores...
March 18, 2026
dreamstime_xxl_172946628
Sponsored
As cyber, physical, and cloud boundaries disappear, security is being redefined by convergence rather than control. This panel unpacks how leaders can turn fragmentation into ...
March 4, 2026
dreamstime_xxl_55726649
Sponsored
Schools and hospitals anchor American communities, yet their open, mission-driven nature makes them increasingly vulnerable to both cyber and physical threats. As attacks grow...
Feb. 18, 2026
mer_24053_security_infowatch_nov_1540x800_1
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in our White Paper.
Jan. 29, 2026
mer_24053_security_infowatch_nov_1540x800
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in our White Paper.
Nov. 3, 2025
dreamstime_xxl_177278255
dreamstime_xxl_177278255
Sponsored
Executive Overview: The Evolution of Healthcare Security Technology Over the past five years, healthcare security has undergone a profound transformation, reshaping how hospitals...
Sept. 23, 2025
mer_24053_sept_media_securityinfowatch_1540x800
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in the White Paper, Meeting the Challenges of Cybersecurity...
Sept. 4, 2025
Paul Rothman
img_0340_copy
Check out some of the live videos shot by Editor Paul Rothman
Feb. 13, 2026
Paul Rothman
pepcom
Check out 7 security and smart home exhibitors live from the show floor
Feb. 13, 2026
introcard
Security Business magazine Editor-in-Chief Paul Rothman and expert security technology consultant Pierre Bourgeix of ESI Convergent take their third-annual roam of CES Eureka ...
Feb. 13, 2026
SIW_GSX25_Radionix
Radionix, part of Keenfinity Group, provides advanced intrusion systems that integrate access control and fire protection, delivering seamless, always-on security and centralized...
Oct. 1, 2025