Sign up for our eNewsletters
Get the latest news and updates
Credit: zim286
The CMMC framework is designed to ensure defense contractors can properly safeguard controlled unclassified information (CUI) and federal contract information (FCI). Over the next three years, nearly all DoD contractors will have to align with one of three cybersecurity levels outlined in CMMC.
With the November 10 deadline behind them, defense contractors face immediate compliance pressure, limited assessment capacity, and zero tolerance from the DoD, making CMMC readiness...
Jan. 20, 2026
Image by Florian Munzert from Pixabay
The Monitoring Association is developing a proposed standard focused on procedures for video-based alarm monitoring center operations.
The proposed TMA-VMS-01 effort focuses on establishing consistent, repeatable procedures for monitoring centers that handle video-based alarm events.
Jan. 16, 2026
Image by TUREK90 from Pixabay
U.S. corporate legal teams report increased exposure to cybersecurity and data privacy disputes as regulatory enforcement and litigation risks continue to evolve, according to Norton Rose Fulbright’s 21st Annual Litigation Trends Survey.
The 21st annual litigation trends survey from Norton Rose Fulbright finds U.S. corporations faced increased cybersecurity and data privacy exposure in 2025, with risks expected...
Jan. 16, 2026
Taylor Criddle is Vice President of Advocacy and Public Affairs for the Electronic Security Association. Taylor.Criddle@esaweb.org
As threats continue to rise against public officials, the Electronic Security Association is pushing new legislation to help protect them in their homes and offices.
Jan. 16, 2026
dam_cremins
The association will recognize Dan Cremins for sustained volunteer leadership and contributions to SIA’s standards programs at The Advance during ISC West 2026.
Jan. 20, 2026
Credit: Andrii Yalanskyi
As digital identities multiply and enterprise perimeters fade, insider threat programs must adapt. AI offers a path forward by providing insight and correlation capabilities far beyond what human analysts can achieve manually
Insider threats increasingly stem from compromised, careless, or fabricated identities. AI is emerging as the critical capability enabling security teams to connect identity exposure...
Jan. 20, 2026
pingidentity
New platform capabilities aim to counter AI-driven fraud by continuously verifying identity across enterprise environments—without forcing infrastructure overhauls.
Jan. 20, 2026
imprivata
New Imprivata survey finds overwhelming support for passwordless access in healthcare, yet technical, clinical, and regulatory hurdles continue to slow adoption across U.S. hospital...
Jan. 20, 2026
John Skowronski brings experience in scaling operations and standardizing processes across multi-location security organizations.
Integrated Openings Solutions has appointed John Skowronski as chief operating officer, bringing seasoned operational leadership to support the company’s focus on execution, scalability...
Jan. 16, 2026
elenabs/iStock / Getty Images Plus/Getty Images
2601sbzhealthcare
As physical and cybersecurity systems intersect in healthcare facilities, integrators and consultants can be the traffic cop to make it all flow smoothly
Jan. 16, 2026
Paul F. Benne is a 37-year veteran in the protective services industry. He is President of Sentinel Consulting LLC, a security consulting and design firm in based in New York City. Connect with him via LinkedIn at www.linkedin.com/in/paulbenne or visit www.sentinelgroup.us
Adapt or die may take on a whole new meaning for integrators and consultants in the new year.
Jan. 16, 2026
David Morgan is Co-Founder at SD Marketing, a full-service marketing agency dedicated exclusively to the security industry. He has spent 14+ years helping security integrators and dealers grow through data-driven, innovative marketing strategies. Contact him at 626-806-6800, purplecow@sd.marketing or visit https://sd.marketing.
A simple template that generates engagement and upgrades
Jan. 16, 2026
Fredrik Nilsson, Vice President of the Americas for Axis Communications, is the author of 'Intelligent Network Video: Understanding Modern Video Surveillance Systems.'
Book royalties from "Intelligent Network Video" continue to support Mission 500 through a long-standing philanthropic effort led by Axis and Fredrik Nilsson.
Jan. 20, 2026
From left to right: Murat Keskinkilinc and Pawandeep Singh (KEENFINITY Group), Martijn van Bodegom (Avonic), as well as Walter Harrewijn (CEO of Avonic) and Lars van den Heuvel (KEENFINITY Group), at the signing ceremony of the acquisition agreement.
Keenfinity Group has signed an acquisition agreement with Avonic, expanding its conferencing portfolio with AI-driven video cameras and voice-tracking technologies for professional...
Jan. 16, 2026
The SecurOS Soffit from ISS was recently deployed at the Brand Road pedestrian crossing in Dublin, Ohio, in response to residents’ safety concerns.
The City of Dublin, Ohio, deployed ISS SecurOS Soffit at a pedestrian crossing to improve pedestrian visibility and driver awareness using AI-enabled illumination.
Jan. 14, 2026
Jeff Perri previously founded access control company PDK and later served as its President and COO before joining SiteStream Security.
SiteStream Security has appointed Jeff Perri as CEO as the company looks to strengthen its dealer ecosystem and support its next phase of growth.
Jan. 14, 2026
David Bunzel is the Executive Director of the Physical Security Interoperability Alliance (PSIA). www.psialliance.org.
Why integrators should care about the Physical Security Interoperability Alliance’s PKOC credential specification
Jan. 16, 2026
Credit: Laurence Dutton
AI models trained on human behavior can catch these gaps. Not by matching against a list of known bad signatures, but by noticing when something just doesn't look like a real person.
Deepfakes and bots are yesterday’s problem. Today’s threat is AI-built identities that behave almost like humans—and require behavior-based detection to stop them.
Jan. 13, 2026
Sign In Solutions has acquired The Receptionist, integrating the Denver-based visitor management company’s Radical Support® service model into the Sign In Solutions and Sign In App portfolios.
The acquisition brings The Receptionist’s Radical Support® service model into the Sign In Solutions and Sign In App portfolios, expanding visitor management capabilities for more...
Jan. 12, 2026
Laura Berga, Vice President of Customer Operations, and Damon Standish, Vice President of Customer Success, were recently promoted by Integrated Control Technology.
ICT has elevated Damon Standish and Laura Berga to vice president roles overseeing customer success and customer operations across the organization.
Jan. 12, 2026
rothman_new_headshot3
NVIDIA’s Jensen Huang explains why collaboration – not competition – is our best defense against AI threats
Jan. 16, 2026
Timothy J. Pastore Esq., is a Partner in the New York office of Montgomery McCracken Walker & Rhoads LLP (www.mmwr.com), where he is Vice-Chair of the Litigation Department. Before entering private practice, he was an officer and Judge Advocate General (JAG) in the U.S. Air Force and Attorney with the DOJ. tpastore@mmwr.com • (212) 551-7707
Records of conversations with AI assistants could be used as evidence, creating a new data risk for you and your company.
Jan. 16, 2026
inlinelogos
New integration pairs Wiz’s cloud risk visibility with Swimlane automation to accelerate vulnerability response and remediation.
Jan. 15, 2026
arlo_technologies_inc_logo_lock_up___horizontal_ar
Extended partnership brings Arlo’s smart security platform and AI-driven capabilities deeper into the SmartThings ecosystem.
Jan. 6, 2026
Redefining Security in 2025 Part 1: Breaking Leadership Barriers with GMR CEO Mary Gates
Mary Gates discusses the GMR Security Consulting Group rebrand, the rise of human-centric security strategies, and the unique strengths female security leaders bring to the table...
Nov. 5, 2025
russpodintrocard
Russ Munisteri discusses the evolving landscape of cybersecurity, the challenges facing cyber workforce development, and the critical role of training in defending against today...
Oct. 22, 2025
taradunningpodintrocard
Wesco's Tara Dunning explores how AI, IoT, and cloud technologies are transforming the role of today’s security integrators.
Oct. 8, 2025
echodyneleopodcard
Leo McCloskey discusses executive orders, the critical role of radar in counter-drone operations, how easy drones are to buy (or build), and how to fortify our most critical sites...
Sept. 24, 2025
dreamstime_xxl_55726649
Sponsored
Schools and hospitals anchor American communities, yet their open, mission-driven nature makes them increasingly vulnerable to both cyber and physical threats. As attacks grow...
Feb. 18, 2026
webinar_state_of_industry
January 27, 2026 1:00 PM ET / 12:00 PM CT / 10:00 AM PT / 6:00 PM GMT  Duration: 1 hour Already registered? Click here to log in. A certificate of attendance will be...
Jan. 27, 2026
dreamstime_xxl_153621251
Sponsored
What if your security data could unlock new efficiency, smarter decisions, and real financial returns? In this expert-led session, learn how modern intelligence strategies are...
Jan. 21, 2026
dreamstime_xxl_137795292
Sponsored
Discover how AI-driven video intelligence is reshaping real-time threat detection and elevating security operations across industries. Join leading experts as they unpack next...
Jan. 7, 2026
mer_24053_security_infowatch_nov_1540x800
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in our White Paper.
Nov. 3, 2025
dreamstime_xxl_177278255
dreamstime_xxl_177278255
Sponsored
Executive Overview: The Evolution of Healthcare Security Technology Over the past five years, healthcare security has undergone a profound transformation, reshaping how hospitals...
Sept. 23, 2025
mer_24053_sept_media_securityinfowatch_1540x800
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in the White Paper, Meeting the Challenges of Cybersecurity...
Sept. 4, 2025
mer_24053_siw_content_syndication_ad_1540x800_1b
Sponsored
Before you dial in your access control strategy, read the new report: Trends in Access Controllers: How Modern Challenges Are Influencing Technology Innovation. See where the ...
July 23, 2025
SIW_GSX25_Radionix
Radionix, part of Keenfinity Group, provides advanced intrusion systems that integrate access control and fire protection, delivering seamless, always-on security and centralized...
Oct. 1, 2025
dsi_by_detex
DSI by Detex designs and manufactures heavy-duty security hardware — exit devices, turnstiles, alarms, access controls — built in the U.S. for durability, reliability and seamless...
Sept. 30, 2025
SIW_GSX25_Ai_RGUS
Ai-RGUS provides AI-driven software to monitor and maintain video surveillance systems, ensuring camera health, image quality and system reliability for enterprises and critical...
Sept. 30, 2025
SIW_GSX25_NAPCO
NAPCO Security Technologies designs and manufactures security, fire, access control and locking systems through its Napco, Alarm Lock, Marks USA and Continental Access brands,...
Sept. 30, 2025