Information Technology
Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
Business Transformation in the Age of AI
When people talk about artificial intelligence in business transformation, the focus tends to circle around solutions and products. New models, automation tools, intelligent assistants—you’ve heard it all. But what often gets missed in these conversations is the real driver: How do these AI solutions actually fit into the enterprise business operating system? It’s not enough…
Keep Reading »Better Together: How Edge AI and Agentic AI Combine to Provide Speed and Judgment
A recent comment from a senior security leader (formerly with a Fortune 50 company) cut to the heart of a growing debate. He said that edge artificial intelligence (AI) sometimes feels like a pricing tactic, a way for manufacturers to justify higher costs or lock buyers into proprietary ecosystems. While his caution has merit, it…
Keep Reading »How Agentic AI Can Redefine Physical Security
In a recent conversation with the chief information security officer and chief revenue officer of a large enterprise, I was surprised to learn that physical security risks were not on their enterprise risk dashboards. Cyber threats, financial exposures and compliance risks were closely monitored, but physical security—the first line of defense—was missing. This gap is…
Keep Reading »Solving Response With Agentic AI
Across the industry, security devices have scaled faster than the teams tasked with managing them. While we have more surveillance cameras installed than ever before, most of these systems aren’t monitored, making incident review the default position for many organizations. This creates a vicious cycle: review the footage, attempt to understand what happened and figure…
Keep Reading »Generative AI vs. CNN-Based Low-Light Enhancement: Why Preserving Original Video Integrity Matters
In the rapidly evolving world of artificial intelligence-powered imaging, it’s easy to conflate all “AI enhancement” with generative methods. But when it comes to critical applications like surveillance, the distinction between generative and nongenerative AI, convolutional neural network (CNN)-based enhancement is not just technical, it is fundamental to trust, integrity and evidence reliability. Surveillance cameras…
Keep Reading »From ISC West 2025 to RSAC25: Cybersecurity Takeaways From Two of the Top Security Events
As spring comes to an end, the Security Industry Association (SIA) Cybersecurity Advisory Board is looking back at two of the most significant security events in the world: ISC West (North America’s largest converged security event) and RSA Conference (RSAC) (the world’s largest cybersecurity event). In this article, Cybersecurity Advisory Board member John Gallagher, vice…
Keep Reading »Around the CAB: Cybersecurity Advisory Board Members Share Highlights From ISC West
As we head into summer, the Security Industry Association (SIA) Cybersecurity Advisory Board is looking back at ISC West, North America’s largest converged security event. A topic that was top of mind at ISC West in 2025 was artificial intelligence. AI is rapidly growing across industries, being used for operational improvements and security capabilities. Despite…
Keep Reading »Data Privacy Code of Practice – Access Control
The SIA Data Privacy Advisory Board shares guidance to inform development of sound policies and practices that mitigate privacy risk while leveraging the power of access control and identity management technology.
Keep Reading »Data Privacy Code of Practice – Video Surveillance
The Security Industry Association (SIA) Data Privacy Advisory Board has produced this Code of Practice for Video Surveillance based on common privacy and security principles to provide manufacturers, integrators and end users with guidance that can be used to inform their development of sound policies and best practices that mitigate privacy risks while leveraging the power of video technology.
Keep Reading »Security Technologies Take Flight
Artificial intelligence and the cloud provide airports with efficiencies, regulatory compliance Airports present unique challenges when it comes to security and safety because of their size, risk profile and multiple access points. At the same time, passenger traffic has increased significantly in recent years. Physical access control solutions are essential to keeping airports safe and…
Keep Reading »