10 Stories and Conversations From My Security Reporting in 2025
Key Highlights
-
Industry conversations in 2025 centered on proving security’s value amid shifting business, technology and budget pressures.
-
Event reporting highlighted how integrators, manufacturers and end users are navigating real-world deployment and operational realities.
-
Leadership perspectives and frontline insights revealed a growing emphasis on outcomes, adaptability, and trust across the security ecosystem.
Some stories stick not because they were the biggest or most widely read, but because they change how you think about an industry as you’re covering it. In 2025, my reporting for SecurityInfoWatch took me into conversations with integrators, executives, technologists and practitioners grappling with how security is planned, delivered and valued.
The stories and podcasts linked below reflect those moments, ranging from leadership journeys and channel realities to technology shifts and end-user expectations. They also include one deliberately unconventional entry: a look at how cybersecurity storytelling, infused with music, humor and creativity, offers a glimpse into how artificial intelligence and new tools are influencing not just security technology, but how companies communicate, educate and engage their audiences.
Breaking Stereotypes: The Mother-Daughter Team Leading SCDataCom
This profile explores how a mother-daughter leadership team is guiding SCDataCom while challenging long-standing assumptions about who leads in the security integration business. The story examines succession, culture and leadership style, offering a window into how family-run firms are navigating growth, credibility and generational transition in a traditionally male-dominated industry.
Unlocking the True Value of Security: Why End Users Still Don’t See It
At an ISC West panel session, integrators and end users explored the persistent disconnect between security investments and perceived value. Despite growing threats and technology advances, many organizations still view security as a cost center rather than a strategic asset. The article examines why this value gap endures, drawing on insights from panelists about education, measurable outcomes, and how the industry can better articulate security’s business impact.
How David Vermillion Turned One Good Idea Into a Lasting Legacy
This feature traces the career of David Vermillion, highlighting how a single idea evolved into a long-term contribution to the security industry. The story focuses on mentorship, innovation and the human side of building a business that outlasts its founder, offering lessons on leadership, persistence, and industry stewardship.
Key Building Security Trends From Honeywell’s 2025 User Group
Reporting from Honeywell’s 2025 User Group event, this article outlines the building security trends gaining traction among enterprise users. Topics include tighter integration between security and building systems, lifecycle management, cybersecurity awareness, and the growing expectation that security teams support broader operational and sustainability goals.
Shaping the Future of Security Integration With Everon CEO Don Young
In this podcast interview, Everon CEO Don Young discusses the company’s strategic direction, market positioning and views on the evolving role of large-scale security integrators. The conversation touches on enterprise customers, managed services, workforce challenges, and how integration firms are adapting to changing technology and customer expectations.
How James Ward Wired His Way to the Top
This profile looks at the career path of James Ward, detailing how hands-on technical experience helped shape his leadership approach. The story emphasizes credibility, problem-solving, and the value of field experience in guiding organizations through growth, technology change and competitive pressure in the security integration market.
Lessons From the Front Lines of the SMB Security Channel
Brian Lohse, General Manager of Commercial at Alarm.com, shared insight into the realities facing integrators serving small and mid-sized businesses. The Q&A examines how SMB-focused providers are navigating margin pressure, labor constraints and customer expectations while shifting toward recurring revenue and service-led models. Lohse emphasized the importance of operational discipline, technology adoption and clearly communicating value to sustain growth in a highly competitive channel.
GSX School Safety Session Urges Multi-Use Tech Adoption
Caity Peak, collaborative policing strategist at Flock Safety, shared insights at GSX 2025 on how schools can strengthen safety while improving everyday operations. Drawing on law enforcement experience, Peak urged adoption of “multi-use” technology, such as vehicle recognition tied to dismissal processes, that delivers both daily efficiency and safety benefits. She also highlighted the importance of partnerships between schools, law enforcement and tech providers to close operational gaps.
SIA’s 2026 Megatrends Push Strategic Change
Drawing on insights from SIA leadership and industry research, the story looks at the 2026 security megatrends expected to drive strategic change across the channel. Topics include shifting routes to market, increased solution complexity, workforce pressures and the growing emphasis on outcomes over transactions. The analysis highlights how integrators, manufacturers and service providers will need to adapt business models and collaboration strategies to remain competitive.
Polkas, Pop Songs and PKI in Keyfactor’s Cybersecurity Album
Blending culture and technology, this story uses a creative lens to explore how Keyfactor approaches public key infrastructure (PKI) and cybersecurity education. The article illustrates how storytelling and unconventional communication can help demystify complex security concepts for broader audiences without sacrificing technical rigor.
About the Author
Rodney Bosch
Editor-in-Chief/SecurityInfoWatch.com
Rodney Bosch is the Editor-in-Chief of SecurityInfoWatch.com. He has covered the security industry since 2006 for multiple major security publications. Reach him at [email protected].














