Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it.
Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk.
What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out.
Bosch Video Systems will introduce products and solutions designed to significantly enhance situational awareness for customers. Visitors to the GSX booth 1555 will experience a GenAI solution with reasoning capabilities, cameras with edge-based AI, and the latest version of BVMS software that helps users focus on events that need attention. Leveraging visual intelligence, the new offerings empower customers to anticipate potential incidents and quickly take measures to address adverse situations.
Viakoo today announced a breakthrough in IoT vulnerability remediation that renders traditional, time-consuming methods obsolete. With the release of Device Firmware Manager AutoMode (DFM-AutoMode), Viakoo is enhancing its flagship Viakoo Action Platform with an autonomous remediation solution powered by AI intelligence. This new capability shrinks an organization's IoT attack surface faster than any other security solution by dramatically accelerating the time to remediate known vulnerabilities.
I have been looking forward to this year’s GSX show in New Orleans, the Cresent City, or if you prefer The Big Easy. It seems like quite a while since we’ve been here. Twenty years ago, ASIS, as it was known then was literally washed out of the city by someone known as Katrina. It is a good thing to come back to NOLA.
- By Ralph C. Jensen
- Sep 26, 2025
Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas.
Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications.
In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense.
- By Steve Durbin
- Sep 09, 2025
i-PRO Co., Ltd. (formerly Panasonic Security), a leading global manufacturer of edge computing cameras for security and public safety, today announced the successful deployment of its advanced, AI-powered camera technology at a major UK aerospace manufacturing facility. The project, delivered in partnership with long-time integrator Richards CCTV, modernized the site’s aging security infrastructure, addressing stringent aviation industry compliance needs while enhancing safety, operational efficiency, and future scalability.
Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago.
- By Dr. Barry Norton
- Sep 05, 2025
Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities.
Laserfiche, a SaaS provider of intelligent content management and business process automation, recently released new survey findings on AI adoption in the workplace, revealing that nearly half of Americans (49%) who use AI at work keep it to themselves, with 15% deliberately avoiding telling their manager.
Artificial Intelligence Technology Solutions, Inc., along with its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD) today announced the publication of a new case study detailing the successful deployment and performance of RAD’s SARA™ platform at OneWatch, an Indiana-based monitoring center and a RAD authorized dealer. The release of this case study follows a recent presentation during The Monitoring Association’s Virtual Product Review (VPR) series, titled “Agentic AI Is Transforming Remote Monitoring Operations, Are You Ready?” The full webinar is available for viewing by following this link.
Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases.
Recently, Simbian introduced the first benchmark to comprehensively measure LLM performance in SOCs, measuring LLMs against a diverse range of real alerts and fundamental SOC tools over all phases of alert investigation, from alert ingestion to disposition and reporting.
AI innovation is rapidly transforming video security. Edge-based AI centered on object detection excels at detecting people and vehicles to alert to threats like brandished guns or perimeter breaches. However, the onus is on the user to gather more details to fully understand the situation.
- By Matthew Cirnigliaro
- Jul 28, 2025
AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk.
The security industry is facing a transformation unlike any in its history. Indeed, much of the modern world is in this position. From the industrial revolution to the rise of automation, labor-intensive roles have continuously evolved, and security is no exception. AI is now fundamentally altering how security is managed, shifting from human-reliant surveillance and guard services to intelligent, autonomous security solutions.
- By Steve Reinharz
- May 13, 2025
Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency.