| | | | | | By Steve Lasky Drata’s Matt Hillary on building transparent, business-aligned security programs that thrive on visibility—not perfection |
|
|
|
| |
|
|
|
| | Sponsored | | | | From Trikke Professional Mobility Enterprise security teams are adopting the Trikke Defender for high-visibility standing patrol that seated vehicles can’t deliver. Its compact design navigates restricted areas beyond the reach of golf carts and patrol vehicles, while swappable batteries eliminate charging downtime. Teams cover more ground with greater awareness and faster incident response. |
|
| | |
|
| |
|
|
|
| | | | As organizations modernize the software development lifecycle to support rapid deployment and cloud native workflows, traditional IAM frameworks often struggle to keep pace with the growing complexity of developer tools, service accounts and temporary privilege needs. |
|
|
| | From perimeter barriers to high security portals, a layered access control strategy enables critical infrastructure operators to protect sensitive areas while maintaining operational efficiency. |
|
|
| | The most consequential security decisions now reside in enterprise conference rooms, and women are increasingly the leaders aligning operations, governance and accountability in real time. |
|
|
| | The company’s 2025 Cyber Risk Report finds extortion tactics shifting toward data theft, rising credential harvesting activity and growing losses tied to third-party vendor breaches. |
|
|
| | Threat intelligence firm SOCRadar identified the publicly accessible Elasticsearch instance, which it said held indexed U.S. identity records — including full SSNs — and classified the exposure as critical due to its scale and searchable structure. |
|
|
| | The Security Industry Association has released a new Corporate Credential Design Guide aimed at helping organizations strengthen security, improve interoperability and standardize corporate ID credential programs. |
|
|
| | The acquisition adds nationwide guarding and executive protection services to Knightscope’s technology portfolio as the company advances its strategy to deliver integrated, outcome-based security under a single managed platform. |
|
|
|
| |
|
|
|
| | | | BEST OF SECURITY TECHNOLOGY EXECUTIVE |
| | |
| | By Steve Lasky For CSOs and risk executives, the implication is clear: we must expand our definition of protection. |
|
|
|
| |
|
|
|
| | | | Discover how AI-driven video intelligence is reshaping real-time threat detection and elevating security operations across industries. Join leading experts as they unpack next-gen analytics, ethical considerations, and the future of intelligent surveillance. |
|
|
| | What if your security data could unlock new efficiency, smarter decisions, and real financial returns? In this expert-led session, learn how modern intelligence strategies are redefining security as a true business accelerator. |
|
|
| | i-PRO IT/Cyber Director Will Knehr discusses how threat actors can hack cameras to breach networks, why AI is becoming another attack vector, and what “ethical hacking” can do to harden your security systems. |
|
|
| | Join host Steve Lasky and Michael Niola as they explore the future of integrated systems, AI in security, and designing safety into spaces from day one. |
|
|
| | Security Canada Central 2026, Oct. 21-22, 2026, will held at the Toronto Congress Centre in Toronto, Ontario. This flagship CANASA regional event draws thousands of security industry professionals from across Canada for two days of exhibits, technology demonstrations, education sessions and networking designed to help attendees stay ahead of trends... |
|
|
| | Critical Infrastructure Protection & Resilience North America (CIPRNA) Expo — taking place March 10-12, 2026, in Baton Rouge, La., this event brings together critical infrastructure owners/operators, government agencies, security and resilience professionals, and technology providers for three days of expert-led sessions, networking, and ... |
|
|
|
| |
|
|
|
| | Sponsored | | | | From Defense Strategies Institute The Insider Risk Summit West unites the nation’s leading experts, innovators, & security professionals dedicated to tackling one of today’s most complex challenges — the insider risk. This premier forum will bring together voices from big tech, AI, social media, energy, and all levels of government to explore the evolving insider risk landscape and the strategies needed to stay ahead of it. |
|
| | |
|
| |
|
|
|
| | |
|
| | |
|