Sign up for SecurityInfoWatch Newsletters
Get the latest news and updates.
Mitsubishi Electric Moves to Acquire Nozomi Networks, Enhancing OT Cybersecurity
Mitsubishi Electric had previously invested in Nozomi Networks during its Series E funding round in 2024, establishing a foundation for this acquisition.
Sept. 9, 2025
Doll most recently served as executive vice president of customer engagement at the International Code Council (ICC), where she held successive executive positions over the past eight years.
TMA has appointed longtime association executive Whitney A. Doll as its new CEO, effective October 1.
Sept. 9, 2025
Michael Dorrian will continue to lead operations as general manager following Security 101’s acquisition of Dorrian Properties.
Security 101 has acquired Dorrian Properties, expanding its presence in Pittsburgh and Philadelphia while strengthening its national platform through franchise conversions and...
Sept. 9, 2025
A new Kiteworks report highlights the growing impact of visibility gaps on enterprise data security and compliance.
Kiteworks’ 2025 survey finds that blind spots in third-party relationships, AI governance, and breach detection are driving higher risks and costs for enterprises worldwide.
Sept. 8, 2025
se_logo_tm_tagline_blue
A changing security landscape driven by risk and compliance warrants a new name.
Sept. 9, 2025
Credit: Jacob Wackerhausen
Security leaders today face a perfect storm of escalating threats and rapidly advancing technologies, putting pressure on them to make faster, smarter decisions about the tools and partners they rely on.
In a crowded, fast-changing security market, vendors that lead with expertise, insight, and mission—not just products—will earn the trust of today’s pressured CSOs.
Sept. 9, 2025
Credit: DNY59
AI agents, specifically designed for the corporate security industry, will enable in-house teams to deliver unimaginable services that were previously unimaginable.
From guard posts to AI powerhouses: Why the future of corporate security starts now.
Sept. 9, 2025
Credit: narvo vexar
Zero Trust is often referred to as a strategy, but to implement it you have to use solutions that support the core rule of never trust, always verify. Nothing is allowed to operate without proving its identity and authorization, not just once but continuously.
Zero Trust isn’t just for firewalls—your badge readers, cameras, and controllers are now frontline targets, and continuous device verification is the only way to keep them from...
Sept. 9, 2025
Carson Clemons has been promoted to Vice President of National Accounts Installation at Everon.
Everon has promoted Carson Clemons to VP of National Accounts Installation, where he will oversee project and program management teams to enhance customer experience.
Sept. 9, 2025
Based in Louisville, Ky., ORR Protection provides mission-critical fire protection solutions, delivering design, installation, inspection, testing, maintenance and remote monitoring nationwide.
ORR Protection introduced SelectORR and ProtectORR at RE+ 2025, combining digital tools and turnkey hardware bundles to streamline fire protection for modular and containerized...
Sept. 9, 2025
lsp_nlc
GSX 2025 Booth 1345: Enables managed power solutions for FlexPower systems.
Sept. 8, 2025
altronix_eflowpro
GSX 2025 Booth 2155: Converts 90-256VAC input into a selectable 12VDC output providing up to 15A, or a 24VDC output.
Sept. 8, 2025
Credit: DrAfter123
The leap from 3D to Four-Dimensional Security Surveillance (3D plus Time) comes from fully integrating the time dimension into automated analysis, decision support, and action.
AI-powered Four-Dimensional Security Surveillance is redefining what’s possible by turning physical security from passive monitoring into proactive, predictive and fully integrated...
Sept. 9, 2025
Credit: Thanabodin Jittrong
The pace of commercial drone innovation in the past 18 months has been extraordinary, transforming what’s possible for both public safety and private protection.
Drones are the unmissable frontier in private security operations but are they ready to cross the technology threshold?
Sept. 9, 2025
Credit: Ikryannikovgmailcom
Organizations need to treat physical security systems with the same rigor as their IT infrastructure.
The changing security landscape and closer integration with network platforms have created myriad new challenges for users and their security systems.
Sept. 9, 2025
Credit: AndreyPopov
As you evaluate vendors, do not get mesmerized by the technology. You should certainly consider hardware and software capabilities and features, but there are many other, non-technology questions vendors should answer for you.
From passive watching to strategic insight: Designing video surveillance systems that drive real business value.
Sept. 9, 2025
Credit: panumas nikomkai
Data center security is a robust, multi-faceted strategy that integrates both physical and cybersecurity safeguards to safeguard critical information and ensure operational continuity via human-AI cooperation.
Fortifying the digital fortress: How data centers are reinventing security for an AI-driven threat landscape.
Sept. 9, 2025
Credit: StockPlanets
gettyimages2200112190
Leveraging Innovative Approaches in Technology for Safer Schools
Sept. 9, 2025
gsx_product_showcaseoncafe2x_002
GSX 2025 Booth 2326: Company expands its offerings into cloud-based access control.
Sept. 8, 2025
2112telephoneentrysystemwithapponphone_copy_3x3
GSX 2025 Booth 727: Includes a new low light camera and improved lighting for nighttime operation.
Sept. 8, 2025
Credit: Buraporn meelanniyom5
gettyimages2228273155
AI is not a magic bullet, but it is driving transformative change.
Sept. 9, 2025
alpha_vision_blueprint
Alpha Vision is set to debut its Physical AI Outdoor Security Platform at the Blueprint Conference in Las Vegas.
Sept. 9, 2025
Ai Threats Span The Full Stack Your Security Strategy Should, Too
Interplay among the elements of the AI and application stack is the new cybersecurity reality.
Sept. 9, 2025
JuSun / E+ via Getty Images
Advances in AI and cloud services are streamlining the path to cybersecurity compliance across the Defense Industrial Base (DIB).
As CMMC deadlines approach, defense contractors are turning to AI and cloud tools to meet compliance requirements faster, more affordably, and with less risk.
Sept. 4, 2025
Ethically Hacking Your Surveillance System With i-PRO's Will Knehr
i-PRO IT/Cyber Director Will Knehr discusses how threat actors can hack cameras to breach networks, why AI is becoming another attack vector, and what “ethical hacking” can do...
Aug. 27, 2025
Shaping the Future of Security Integration with Everon CEO Don Young
In this exclusive, join Everon CEO Don Young for a chat about his 90-day company roadmap, trending tech, mentorships and more.
Aug. 13, 2025
jeffcorrallpodcard
Host Steve Lasky and March Networks Chief Product Officer Jeff Corrall explore one of the most transformative forces in video surveillance today—generative AI.
July 30, 2025
schonfeldpodcastcard
On this episode of SecurityDNA, HiveWatch CEO Ryan Schonfeld reflects on his career, convergence, and challenges facing security leaders in this exclusive interview.
July 16, 2025
banner
Sponsored
Register Now for the 5th Annual October Campus Safety & Security Series! Join us for an important series of live web panel discussions focused on enhancing campus security...
Oct. 9, 2025
ID 80069694 © Kittipong Jirasukhanont | Dreamstime.com
dreamstime_xxl_80069694
Sponsored
Discover how organized retail crime is evolving into a sophisticated threat—and what retailers, law enforcement, and communities can do to fight back—in this must-attend live ...
Oct. 22, 2025
ID 58888653 © Ginton | Dreamstime.com
dreamstime_xxl_58888653
Sponsored
Discover how cutting-edge technology—from AI and drones to real-time data—can transform security at special events and sporting venues in this expert-led live webinar.
Oct. 8, 2025
ID 533763 © Michael Pettigrew | Dreamstime.com
dreamstime_xxl_533763
Sponsored
Discover how cutting-edge technologies like AI and automation are transforming Security Operations Centers into proactive, agile defenders against the rapidly evolving cyber threat...
Sept. 4, 2025
mer_24053_sept_media_securityinfowatch_1540x800
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in the White Paper, Meeting the Challenges of Cybersecurity...
Sept. 4, 2025
mer_24053_siw_content_syndication_ad_1540x800_1b
Sponsored
Before you dial in your access control strategy, read the new report: Trends in Access Controllers: How Modern Challenges Are Influencing Technology Innovation. See where the ...
July 23, 2025
siw_orc_wp_1540x800
Sponsored
Organized Retail Crime (ORC) is a growing threat to the retail industry, with average case costs reaching a staggering $244,509. As a response, retailers are turning to modern...
July 21, 2025
photocustom_gbldcxc_female2securityoperatorreviews
Sponsored
Discover the key benefits of SaaS solutions and what to consider when modernizing your physical security with a cloud-based platform.
July 1, 2025
The State of the Locksmithing Industry: Trends, Challenges, and Opportunities with Locksmith Ledger
Join Paul Ragusa of Locksmith Ledger for an exclusive expert-led webinar to learn which trends and technologies are shaping the future of the industry for locksmiths.
Sept. 5, 2025
Upgrade Your Electronic Access Control System with Locksmith Ledger
Join Paul Ragusa of Locksmith Ledger's exclusive expert-led webinar to learn how you can benefit from making the upgrade to an electronic access control system.
Aug. 8, 2025
SIW_ISCWest25_Vicon
Vicon Security specializes in innovative surveillance and access control solutions. Their offerings include advanced video management systems, AI-powered cameras, and comprehensive...
April 4, 2025
SIW_ISCWest25_Vosker
Vosker is a provider of innovative surveillance solutions, specializing in solar-powered and cellular-enabled security cameras. Their products are designed for remote monitoring...
April 4, 2025