| | | | | | By Shai Gabay As AI-generated voices, emails and video become indistinguishable from reality, companies are struggling to determine whether threats originate from inside or outside their walls. |
|
|
|
| |
|
|
|
| | | | Jeppe Frandsen, vice chairman of the board, has been appointed acting CEO as the company initiates its search for a permanent successor. |
|
|
| | New research from Memoori and insights from analyst Owen Kell highlight how cloud migration and ongoing consolidation are reshaping the access control market. |
|
|
| | Delta’s planned acquisition of Vivotek for about $120 million positions the company to further consolidate its role in the building automation and surveillance market. |
|
|
| | At ISC East, experts warned that digital identity gaps, emerging data challenges and looming quantum threats demand new strategies from security leaders. |
|
|
| | New SOC Analyst Agent, Knowledge Agent and MCP Server aim to reduce alert fatigue and speed response times |
|
|
| | Axis Communications details how its development framework, operating system and cloud platform align with the voluntary cybersecurity requirements. |
|
|
| | Read Hayes, the executive director of the Loss Prevention Research Council, outlines offender behavior patterns, intervention models and intelligence-sharing strategies in a new discussion with former DHS official Michael Evanoff. |
|
|
| | City documents reveal rapid expansion of the network as watchdogs push back on data use and transparency. |
|
|
|
| |
|
|
|
| | | | BEST OF SECURITY TECHNOLOGY EXECUTIVE |
| | |
| | By Jarod Stockdale CPP, PSP, RCDD, CFI, The changing security landscape and closer integration with network platforms have created myriad new challenges for users and their security systems. |
|
|
|
| |
|
|
|
| | | | As cyber threats increasingly target physical security systems, this webinar reveals why Zero Trust is no longer optional—and how to extend its principles beyond IT to protect the new frontline: your badge readers, cameras, and controllers. |
|
|
| | AI holds huge potential for physical security, but most systems struggle to read real-world intent. Join us to explore how next-generation models can move beyond surface-level detection to deliver truly actionable insights. |
|
|
| | Mary Gates discusses the GMR Security Consulting Group rebrand, the rise of human-centric security strategies, and the unique strengths female security leaders bring to the table. |
|
|
| | Russ Munisteri discusses the evolving landscape of cybersecurity, the challenges facing cyber workforce development, and the critical role of training in defending against today’s threats. |
|
|
| | 6/22/2026 - 6/24/2026; Venue: Mandalay Bay Convention Center |
|
|
| | ISC West is the leading comprehensive and converged security trade event in the U.S. |
|
|
|
| |
|
|
|
| | |
|
| | |
|