| | | | | | By Steve Lasky Long plagued by inconsistency, opacity, and sluggish response times, the traditional contract-guarding model is under pressure. Protos Security is betting that a software-driven, network-based approach, fueled by data, integration, and cultural alignment, can deliver the accountability and agility enterprise clients have long demanded. |
|
|
|
| |
|
|
|
| | | | HID's study finds IT leaders accelerating PKI automation and cloud adoption while preparing for AI-driven identity demands and post-quantum risks. |
|
|
| | Arkose Labs report reveals enterprises expect imminent incidents—but are investing just 6% of budgets to stop them. |
|
|
| | As quantum risk moves from theory to inevitability, a new public-private collaboration aims to operationalize the shift to quantum-resilient cryptography across enterprise environments. |
|
|
| | The combination expands Cento’s North American presence and executive search capabilities as demand grows for specialized talent across the evolving security and building services markets. |
|
|
| | The funding will accelerate development of Oasis’s agentic access platform as enterprises seek new ways to manage non-human identities and secure AI-driven infrastructure at scale. |
|
|
| | March Networks and VIVOTEK have announced plans to merge VIVOTEK’s branded business with March Networks, combining their respective video security portfolios to expand scale and capabilities across cloud, hybrid and on-premise environments. The companies said the combined organization will bring together enterprise video management, AI-powered... |
|
|
|
| |
|
|
|
| | | | BEST OF SECURITY TECHNOLOGY EXECUTIVE |
| | |
| | By Evan Bloom Recent online backlash tied to employee conduct reveals why many corporate social media policies fail and how clearer governance, training and enforcement can prevent reputational damage. |
|
|
|
| |
|
|
|
| | | | AI is redefining perimeter security as drones turn the airspace into a new frontline—forcing organizations to rethink what it truly means to defend the edge. This session explores how AI-driven sensing, analytics, and counter-UAS technologies are converging to deliver real-time, multidimensional protection across air, ground, and digital domains. |
|
|
| | As cyber, physical, and cloud boundaries disappear, security is being redefined by convergence rather than control. This panel unpacks how leaders can turn fragmentation into unified resilience—aligning technology, operations, and governance to protect what matters most. |
|
|
| | The latest episode of the Security DNA Podcast features Dr. John D. Byrnes, founder and CEO of the Center for Aggression Management. |
|
|
| | The latest SecurityDNA podcast episode unpacks the sweeping rollout of FedRAMP 20X and CMMC 2.0, revealing why tens of thousands of defense contractors may be unprepared for fast-approaching compliance demands and what it means for the entire supply chain. |
|
|
| | 6/22/2026 - 6/24/2026; Venue: Mandalay Bay Convention Center |
|
|
| | SIA GovSummit 2026 will take place May 20-21, 2026, at the National Housing Center in Washington, D.C. Hosted by the Security Industry Association, the annual government security conference brings together government security leaders and private-sector technologists for high-level discussion and education on public policy, emerging risks and technology... |
|
|
|
| |
|
|
|
| | Sponsored | | Physical security is shedding its siloed past, evolving into a unified, intelligence-driven platform that connects identity, access, and real-time analytics. As access control transforms from gatekeeper to data engine, it’s reshaping how enterprises anticipate risk, protect people, and power smarter decisions. |
|
|
|
| |
|
|
|
| | |
|
| | |
|