Douglas Rissing / iStock / Getty Images Plus via Getty Images
Reduced oversight during a government shutdown leaves critical infrastructure more vulnerable to cyberattacks and prolonged intrusions.
A former hacker explains how shutdowns don’t stop adversaries but instead create conditions that weaken oversight and increase opportunities for cyberattacks across critical infrastruct...

Must Reads This Week

Sign up for SecurityInfoWatch Newsletters
Get the latest news and updates.
afterday / E+ via Getty Images
Eagle Eye Remote Video Monitoring combines AI-powered analytics with professional monitoring to deliver proactive, real-time crime prevention for businesses and properties of all types.
Eagle Eye Networks introduces an AI-driven solution that combines cloud-based video analytics with professional monitoring to detect and prevent crime in real time.
Oct. 22, 2025
Hennepin County Sheriff’s Office telecommunicators monitor emergency calls and coordinate field responses from the agency’s emergency communications center.
The Hennepin County Sheriff’s Office has deployed the Automated Secure Alarm Protocol (ASAP) Service to automate alarm notifications and accelerate emergency response.
Oct. 22, 2025
SimpliSafe is expanding beyond residential protection with new security solutions tailored for small and medium-sized businesses.
Hooman Shahidi, SimpliSafe’s Chief Product Officer, discusses the company’s future under GTCR ownership, its relationship to Everon, and how the acquisition supports continued...
Oct. 21, 2025
dataminr_threatconnect
The planned acquisition combines Dataminr’s real-time AI intelligence platform with ThreatConnect’s internal data and threat management capabilities.
Oct. 21, 2025
ZBeta Announces Chris Martini as Principal Consultant
Chris will guide strategic initiatives, strengthen client partnerships, and help advance ZBeta's mission of delivering transformative solutions.
Oct. 21, 2025
Credit: Moor Studio
Application risks are evolving as fast as application environments. Ninety-two percent of those who have experienced issues with AI-generated code cited insecure code as a primary concern, while 83% pointed to a lack of transparency in AI tools as a significant threat.
With AI-generated code, open-source dependencies, and fragmented toolchains expanding attack surfaces, AppSec leaders are no longer just security specialists—they’re strategic...
Oct. 20, 2025
SIA Women in Security Forum Launches Sixth Annual CAN DO Challenge to Combat Food Insecurity
Running from October 13 through December 3, 2025, the initiative encourages industry members to take action through donations, volunteerism, and community support.
Oct. 20, 2025
Credit: MTStock Studio
If today’s modern CISO has one defining trait, it’s their technical foundation. The new generation is practitioners first: engineers, analysts, and hands-on problem-solvers who understand what it takes to implement and maintain security tools.
A new generation of cybersecurity leaders is rewriting the rules of vendor engagement — demanding transparency, technical depth, and real product performance over polished pitches...
Oct. 15, 2025
Joseph Lynch, left, and Ron Oetjen mark a leadership transition at Minuteman Security & Life Safety, with Lynch moving to Board Chairman and Oetjen stepping into the CEO role effective Jan. 1, 2026.
Effective Jan. 1, 2026, Minuteman Security & Life Safety President Ron Oetjen will become CEO, while founder Joseph Lynch transitions to Board Chairman.
Oct. 21, 2025
Thomas 'Tad' Dowdy (L); Milt Newman (R)
Milt "Milton" Newman joins as Strategic Accounts and Procurement Manager, and Thomas "Tad" Dowdy joins as Operations Manager for Logistics and Aviation Verticals.
Oct. 20, 2025
Jon Polly is the Chief Solutions Officer for ProTecht Solutions Partners (www.protechtsolutionspartners.com), , a security technology consulting firm that works with smart cities and corporations to bring business intelligence and public safety through security IoT applications. He has worked as a Project Manager and System Designer for City-Wide surveillance and Transportation camera projects in Raleigh and Charlotte, N.C.; Charleston, S.C.; and Washington, D.C. He is certified in Critical Chain Project Management (IC3PM) by the International Supply Chain Education Alliance (ISCEA). • (704) 759-6837
End-users are turning to the technology to enable their monitoring provider to be proactive, respond faster, and reduce false alarms.
Oct. 20, 2025
Kermit Mulkins, generated by Shutterstock/Adobe Firefly AI
In a pasture full of brown cows, what’s the one thing you can do for your company that would make it stand out?
In a pasture full of brown cows, what’s the one thing you can do for your company that would make it stand out?
Oct. 20, 2025
i-PRO Security Radar
The Security Radar system supports integration with up to four AI-enabled i-PRO PTZ cameras to deliver precise detection and real-time visual tracking of people and vehicles.
Oct. 22, 2025
Pimloc Adds Video Search Feature to Secure Redact Platform
The new Video Search tool allows officers to find specific footage based on descriptive attributes such as clothing color or type.
Oct. 20, 2025
System Surveyor and Eagle Eye Networks Partner to Streamline Cloud Video Surveillance Design for Resellers
Through this integration, Eagle Eye Networks resellers can access preloaded product profiles within System Surveyor's mobile design tool.
Oct. 20, 2025
courtneyk / iStock / Getty Images Plus via Getty Images
AI-driven analytics platforms turn video data into visual intelligence, helping organizations gain real-time insight to improve safety, efficiency, and decision-making across the enterprise.
AI is redefining video surveillance as a source of real-time visual intelligence, enabling organizations to move beyond loss prevention to data-driven decisions that enhance safety...
Oct. 17, 2025
Iris ID iCAM TD200
The iCAM TD200 face and iris recognition device captures left and right iris images simultaneously, along with a high-quality face image, in a single session.
Oct. 20, 2025
ASSA ABLOY Acquires Kentix in Germany
Kentix, which is based in Idar-Obenstein, Germany, designs and manufactures monitoring and access control products for use in data centers.
Oct. 20, 2025
Industry veteran Joseph Grillo brings more than three decades of experience in electronic security and identification to his new role on Azure Access Technology’s Board of Directors.
Azure Access Technology has appointed industry veteran Joseph Grillo to its Board of Directors to support the company’s strategic growth and leadership in enterprise access control...
Oct. 16, 2025
hid_idmelon_
The agreement adds IDmelon’s FIDO-based passwordless authentication platform and hardware to HID’s expanding identity and access management portfolio.
Oct. 15, 2025
russpodintrocard
Russ Munisteri discusses the evolving landscape of cybersecurity, the challenges facing cyber workforce development, and the critical role of training in defending against today...
Oct. 22, 2025
PhonlamaiPhoto/iStock/Getty Images Plus/Getty Images
gettyimages952969898
A deep dive into two technology solutions that are shifting central monitoring centers into proactive, intelligence-driven services.
Oct. 20, 2025
joseph_ryan
Spoiler: Probably not, but those who best use artificial intelligence to their advantage will have a leg up as we march into the future.
Oct. 20, 2025
highlights_from_the_state_of_ai_fraud_and_privacy_
Survey of 300 fraud leaders shows rising AI threats and privacy regulations creating a dual crisis
Oct. 14, 2025
taradunningpodintrocard
Wesco's Tara Dunning explores how AI, IoT, and cloud technologies are transforming the role of today’s security integrators.
Oct. 8, 2025
echodyneleopodcard
Leo McCloskey discusses executive orders, the critical role of radar in counter-drone operations, how easy drones are to buy (or build), and how to fortify our most critical sites...
Sept. 24, 2025
Bridging Architecture and Security for Smarter Enterprises with The Consulting Group's Michael Niola
Join host Steve Lasky and Michael Niola as they explore the future of integrated systems, AI in security, and designing safety into spaces from day one.
Sept. 10, 2025
Ethically Hacking Your Surveillance System With i-PRO's Will Knehr
i-PRO IT/Cyber Director Will Knehr discusses how threat actors can hack cameras to breach networks, why AI is becoming another attack vector, and what “ethical hacking” can do...
Aug. 27, 2025
dreamstime_xxl_382950321
Sponsored
Discover how video analytics and advanced AI technologies are transforming security, operations, and risk management across industries. Join industry experts as they share actionable...
Nov. 6, 2025
zero_trust_bridge_of_security
Sponsored
As cyber threats increasingly target physical security systems, this webinar reveals why Zero Trust is no longer optional—and how to extend its principles beyond IT to protect...
Oct. 29, 2025
1200x627_classsecure
Sponsored
As Alyssa’s Law reshapes school safety standards nationwide, discover how the ClassSecure™ system empowers districts with rapid emergency response, seamless compliance, and a ...
Oct. 23, 2025
banner
Sponsored
Register Now for the 5th Annual October Campus Safety & Security Series! Join us for an important series of live web panel discussions focused on enhancing campus security...
Oct. 9, 2025
dreamstime_xxl_177278255
dreamstime_xxl_177278255
Sponsored
Executive Overview: The Evolution of Healthcare Security Technology Over the past five years, healthcare security has undergone a profound transformation, reshaping how hospitals...
Sept. 23, 2025
mer_24053_sept_media_securityinfowatch_1540x800
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in the White Paper, Meeting the Challenges of Cybersecurity...
Sept. 4, 2025
mer_24053_siw_content_syndication_ad_1540x800_1b
Sponsored
Before you dial in your access control strategy, read the new report: Trends in Access Controllers: How Modern Challenges Are Influencing Technology Innovation. See where the ...
July 23, 2025
siw_orc_wp_1540x800
Sponsored
Organized Retail Crime (ORC) is a growing threat to the retail industry, with average case costs reaching a staggering $244,509. As a response, retailers are turning to modern...
July 21, 2025
SIW_GSX25_Radionix
Radionix, part of Keenfinity Group, provides advanced intrusion systems that integrate access control and fire protection, delivering seamless, always-on security and centralized...
Oct. 1, 2025
dsi_by_detex
DSI by Detex designs and manufactures heavy-duty security hardware — exit devices, turnstiles, alarms, access controls — built in the U.S. for durability, reliability and seamless...
Sept. 30, 2025
SIW_GSX25_Ai_RGUS
Ai-RGUS provides AI-driven software to monitor and maintain video surveillance systems, ensuring camera health, image quality and system reliability for enterprises and critical...
Sept. 30, 2025
SIW_GSX25_NAPCO
NAPCO Security Technologies designs and manufactures security, fire, access control and locking systems through its Napco, Alarm Lock, Marks USA and Continental Access brands,...
Sept. 30, 2025