Security Executives

The SecurityInfoWatch.com Security Executives category is a collection of news, analysis and information relevant to security executives and professionals.
Credit: vaeenma
Compensating controls are alternative safeguards. You can’t patch a vulnerability, so you deploy something else to reduce the risk.
July 2, 2025
Crutch or cure? The dangerous myth of compensating controls.
360privacyintrocard
July 2, 2025
Chuck Randolph and Trinity Davis explain the dangers faced by organizational leadership, from the top brass to the small business owner.
accelerise_2025_featuredimage_v2887x488
This year’s AcceleRISE will take place Aug. 4-6 in Boston, Massachusetts.
deep_sentinel_sentinelnow_button
June 30, 2025
Deep Sentinel's SentinelNow is an on-demand live guard service.
primeimages / E+ via Getty Images
Advanced digital tools and AI systems support faster, smarter decision-making in evolving security operations.
For over six decades, Defense in Depth has been a cornerstone of security strategy. Now, AI is going far beyond that — delivering intelligent, layered responses that evolve in...
photoman / iStock / Getty Images Plus via Getty Images
Iranian cyber operations often target vulnerable infrastructure sectors like energy, water and healthcare — areas where outdated systems and limited defenses increase the risk of real-world disruption.
June 26, 2025
Despite a halt in military conflict, cybersecurity experts warn that Iran continues to pose a serious and evolving threat to U.S. infrastructure.
Sensormatic Solutions adds Machine Learning to Shrink Analyzer
June 25, 2025
The application’s recent development efforts enhance internal theft analysis, using machine learning (ML) to continuously improve.
Credit: Moor Studio
In this new era, where private companies must navigate a constant churn of global threats, traditional corporate approaches to security are falling short.
June 24, 2025
With global conflict, political violence, and cyber sabotage crossing into U.S. territory, American businesses must adopt a national security mindset to stay resilient and safeguard...
Credit: wildpixel
Looking back a decade, the scene is one of loss prevention personnel thoroughly investigating and preparing organized retail crime (ORC) cases for prosecution, only to have to knock on doors and find a tolerant detective or patient prosecutor willing to take the case
June 24, 2025
Retailers, law enforcement, and prosecutors form a united front against organized retail crime, signaling a national shift toward proactive enforcement.
Credit: AEKKARAT DOUNGMANEERATTANA
Technology is rapidly changing, and the development and performance of large language AI models are set to continue disrupting the retail industry.
June 24, 2025
Managing risk within the U.S.-based retail sector is a continual process that requires a solid framework and the ability to evolve as needs change.
Credit: Shutter2U
A recent Gartner report projects the Digital Twin market to grow from $35 billion in 2024 to $379 billion in 2034, representing a 900% increase over the coming decade.
June 24, 2025
Zero Trust unlocks the data integrity and confidence that delivers the promise of AI to electronic and physical security systems.
Credit: AndreyPopov
At its core, predictive analytics uses historical data, behavioral trends, and machine learning to forecast likely security incidents or operational disruptions.
June 24, 2025
Predictive analytics is transforming security operations—giving leaders time to act, context to decide, and the foresight to anticipate what’s next in an unpredictable risk environment...
Credit: MTStock Studio
Phishing is one of the most common and easily executed cyberattacks. Almost everyone with an email address or a mobile device has encountered a phishing scam before.
June 24, 2025
Social engineering remains one of the easiest ways for cybercriminals to penetrate enterprise defenses; however, trained employees can disrupt the modern kill chain before it ...
Credit: Wirestock
gettyimages1442107515
June 24, 2025
I remember conversations with loss prevention directors in the 1980s and throughout the 90s where stories were shared of bizarre methods for stealing merchandise, gaming POS systems...
Credit: sasha85ru
Physical security professionals need not be Zero Trust experts but should advocate for it, defining their systems’ overall network design and usage.
Intelligent physical security system devices—especially AI-enabled video cameras—have become high-value targets for hackers, who now deploy malware explicitly designed...