Sign up for our eNewsletters
Get the latest news and updates
gmr_logo
New partnership combines practitioner-led security expertise with intelligence, governance and AI risk capabilities to help organizations address emerging threats and operational...
April 29, 2026
updateded_entrust_logo_vtagrgbsb_1125
New collaboration combines IBM Consulting’s transformation services with Entrust’s cryptographic security platform to help organizations inventory, govern and modernize encryption...
April 29, 2026
Avery Dennison’s $75 million investment in Wiliot expands their partnership to advance sensor-based digital identification and accelerate adoption across retail, logistics and food supply chains.
The deal names Avery Dennison as Wiliot’s preferred inlay design and manufacturing partner and expands joint go-to-market efforts across retail, logistics and food.
April 27, 2026
By combining electric fencing with AI-driven monitoring and virtual guarding, the partnership aims to deliver earlier threat detection and a more proactive approach to protecting commercial properties.
AMAROK takes a 45% stake in Evolon to combine electric fencing with AI-enabled video monitoring and virtual guarding into a unified perimeter security offering for commercial ...
April 23, 2026
booth051convincer_1
Featuring bullet-resistant armor and stainless-steel construction, it is engineered to safeguard personnel in the most demanding conditions.
April 29, 2026
Image by Christine Schmidt from Pixabay
A Crisis24 survey found many executives report missed warning signs and costly disruptions, illustrating how a single gap can set off a chain reaction across an organization.
Survey of 303 U.S. executives finds most report missed warning signs, financial losses and challenges translating data into actionable crisis response.
April 28, 2026
Credit: shulz
The attack surface is expanding across multiple dimensions at once. More systems, integrations, permissions, and automated actions are happening continuously in the background.
As artificial intelligence accelerates software development, automation, and decision-making, it is also rapidly expanding the enterprise attack surface. Security leaders who ...
April 27, 2026
Credit: SOMKID THONGDEE
Many mid-market organizations lack a formal CISO role, leaving AI-related decisions and experiments to IT directors or operations leaders who are already responsible for infrastructure, vendor management, and day-to-day security oversight. In these environments, experimentation without structure can quickly create more operational strain than efficiency.
After years of failed pilots and experimental hype, mid-sized organizations are shifting to focused, outcome-driven AI strategies. By starting small, proving ROI quickly, and ...
April 27, 2026
revio
Enables security providers to efficiently manage customers, automate ticketing and schedule service, track inventory, rate and bill for usage-based and recurring charges, and ...
April 29, 2026
poe
Products include an 18-port PoE++ Switch and a 10G PoE++ Injector
April 29, 2026
cp
Provides battery backup, surge protection, and EMI/RFI noise filtering for security systems.
April 29, 2026
Zenitel partners with LAR Rep Group to expand deployment of critical communication solutions across Mexico and Latin America.
Zenitel has appointed LAR Rep Group as its manufacturer’s representative to expand its critical communication solutions across Mexico and Latin America.
April 24, 2026
2137videoentrymain_copy
Designed for modern multi-tenant and commercial environments.
April 29, 2026
d31tdh_start_keypaddoorbird_d31dkh
Designed for multi‑tenant residential and commercial buildings with up to 1,000 units.
April 29, 2026
Fort Lee Police Department enhances city-wide public safety operations with Genetec Security Center, integrating video surveillance, ALPR and digital evidence management.
The Fort Lee Police Department has modernized city-wide public safety operations using Genetec Security Center, integrating video management, ALPR and digital evidence tools to...
April 24, 2026
The AMG840 Series Network Server Appliance is designed for high-performance network monitoring in critical infrastructure and security environments.
AMG Systems introduces the AMG840 Series, a high-performance rack-mount appliance built for advanced network monitoring and critical infrastructure applications.
April 22, 2026
sdcdatacentersolutions
SDC electrified hardware like exit devices, digital keypads, shear locks and push plates provide physical security for data centers.
April 29, 2026
cxda800_pr
Provide an instant audible and visual alarm indication of unauthorized exit or entry of mechanically secured doors.
April 29, 2026
22eo
Ideal for offices, schools, retail, and healthcare facilities.
April 29, 2026
Alcatraz
An Alcatraz survey highlights how lost or forgotten badges disrupt operations, as employees balance convenience with concerns over data security, system reliability and potential misuse of biometric information.
A new Alcatraz survey finds rising employee interest in biometric workplace access, while highlighting privacy concerns and a generational divide in adoption.
April 23, 2026
Credit: Isara Methong
If a cybersecurity framework is a collection of outdated subscriptions, the subscription manager is an audit using domain name system (DNS) intelligence. DNS data not only helps weed out potential attack vectors but also provides AI systems with high-quality data to preemptively take down threat actors.
By tapping into DNS intelligence, organizations can gain full-spectrum visibility into connected assets, reduce hidden attack surfaces, and arm AI-driven defenses with the real...
April 22, 2026
SIW STAFF
From left: Jordan Hill of HiveWatch, Thru Shivakumar of Cohesion, Jeffrey Groom of Acre Security, Jason Veiock of Bearing and Sarah Rodrigues of Acre Security. The panel focused on how purpose-built AI is being applied in real-world security operations to turn complex data into actionable insight and drive more proactive response.
At ISC West 2026, a panel of security technology leaders argued that the organizations getting real value from AI aren't the ones chasing the technology. They're the ones who ...
April 8, 2026
The “Path to Intelligent Security” framework
Convergint’s “Path to Intelligent Security” report outlines a five-level model — from detection and description to correlation, prediction and automated response — designed to help organizations advance AI-enabled security operations beyond reactive monitoring.
Convergint’s new “Path to Intelligent Security” framework introduces a five-level model designed to help organizations move from fragmented AI deployments to integrated, outcome...
April 7, 2026
Spot AI announced at ISC West 2026 that it is shifting to a fully channel-based sales model and offering $2 million in equity to qualifying partners.
Spot AI is ditching direct sales, dangling equity to channel partners and upgrading its platform from task-completing agents to full AI coworkers.
April 7, 2026
tim_freestone
Security DNA
Drawing on Kiteworks research, Tim Freestone warns that organizations racing to adopt agentic AI without proper governance and control are exposing themselves to significant security...
April 15, 2026
artorias
Security DNA
Artorias co-founder Stefano Ritondale breaks down the intelligence failures that left enterprise security teams flat-footed, and why AI-driven OSINT is no longer optional.
March 18, 2026
secureframeimage
Security DNA
The latest SecurityDNA podcast episode unpacks the sweeping rollout of FedRAMP 20X and CMMC 2.0, revealing why tens of thousands of defense contractors may be unprepared for fast...
March 18, 2026
vlcsnap2026012810h45m53s446
Security DNA
The latest episode of the Security DNA Podcast features Dr. John D. Byrnes, founder and CEO of the Center for Aggression Management.
Jan. 28, 2026
dreamstime_xxl_162922042
Sponsored
Executive protection is no longer just about physical security—it’s a dynamic, intelligence-driven discipline shaped by political volatility, cyber threats, and the rapid amplification...
May 14, 2026
dreamstime_xxl_213699973
Sponsored
AI is rapidly transforming security from reactive monitoring to proactive threat prevention, using real-time video analytics to detect risks before they escalate. But as predictive...
June 3, 2026
webchat_header_image_endeavor_1300x565
Sponsored
Join this live session to uncover the true cost of theft and learn how to identify vulnerabilities and move to a proactive, deterrence-first approach. Register today to protect...
May 19, 2026
dreamstime_xxl_47538865
Sponsored
Cyberattacks are no longer confined to data—they’re crossing into the physical world, disrupting operations and exposing critical vulnerabilities across interconnected systems...
May 20, 2026
lumanabuyers_guide_image
Sponsored
Stop chasing false alarms and start acting on verified threats. Discover how to choose an AI gun detection platform that delivers real-time, actionable intelligence to protect...
April 21, 2026
lumanaevaulating_ai_image
Sponsored
This comprehensive guide provides a strategic roadmap for organizations looking to move beyond traditional, reactive CCTV and basic cloud-based cameras. It identifies the 10 critical...
April 21, 2026
mer_24053_security_infowatch_nov_1540x800_1
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in our White Paper.
Jan. 29, 2026
mer_24053_security_infowatch_nov_1540x800
Sponsored
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in our White Paper.
Nov. 3, 2025
NAPCO highlights its new MVP Cloud-Based Access Control Platform at ISC West 2026
At ISC West 2026, SecurityInfoWatch interviews Napco Security Technologies’ Rob Etmans, Director of Sales, focusing on how the company’s MVP Access cloud platform is helping dealers...
March 31, 2026
Prometheus exec explains the complications when physical and cybersecurity come together
At ISC West 2026, SecurityInfoWatch interviews PSG’s Jeremy Freeze-Skret, VP of Engineering, focusing on the convergence of cyber and physical security and how organizations are...
March 31, 2026
Live from the Traka booth at ISC West 2026!
At ISC West 2026, SecurityInfoWatch interviews TRAKA Technical Director Hector Melendez, focusing on trends in electronic key management and the role of intelligent key cabinets...
March 31, 2026
Schlage embraces the mobile credential evolution at ISC West 2026
At ISC West 2026, SecurityInfoWatch interviews Olivia Renaud from Allegion, focusing on the evolution of wallet-based mobile credentials, the impact of their partnership, and ...
March 31, 2026