Archive for 2016
Threat from Above
How can potentially dangerous drones be detected and defeated? Unmanned aerial vehicles (UAVs), or drones, have been in use for many years but had not been widely adopted by the mass market until recently. With that adoption has come many new and productive applications of drones, but new threats have also emerged in a wide…
Keep Reading »Video Storage Wars
Hyper-convergence technology can simplify surveillance storage and enhance security The physical security systems and devices of today are more connected via LANs and the Internet than ever before. This extension of the network creates great opportunities, such as the growth of the Internet of Things (IoT), but it also creates additional vulnerabilities. Any IP-enabled device…
Keep Reading »Because You Can Never Be 100% Cybersecure
Effective use of strategies for countering attacks can minimize risk When was the last time you changed your password for your online bank account? Your email? Your social media accounts? How about your online shopping accounts or the myriad other login credentials that make up your digital life? Has it been a few months? Maybe…
Keep Reading »Augmented Reality is for More than Capturing Pokémon
When combined with IoT, the technology could have a big impact on security In 2016, Pokémon GO captured the mobile gaming world by becoming the most popular application in both the Apple and Android app stores, with more than 100 million downloads within the first few weeks of its public release in early July. The…
Keep Reading »In a Hand or a Face
Fingerprints, facial recognition and other biometrics can make banking more secure As society becomes more technologically sophisticated, so does the way we manage and protect our money. Long gone are the days of hiding money under the mattress, or even needing to write a check by hand. But with the convenience of ATMs, online banking…
Keep Reading »A Laser Focus on Enhanced Security
New scanners can improve the accuracy and reliability of intrusion detection systems The electronic physical security industry has done a good job with advancing technology over the past 100-plus years. Current systems are smarter than ever, and that intelligence brings new features and benefits. As more systems migrate to a digital format, larger amounts of…
Keep Reading »Beginner’s Guide: Kickstart Your Location-Based Monitoring Program
This beginner’s guide will help you understand the step-by-step process you can create for your corporate security team within a location-based intelligence platform. I. Set Goals With any new program, it is critical to determine your goals. It is good to start with a specific goal in mind, for example, utilize the platform around the…
Keep Reading »5 Ways Location-Based Intelligence Aids Security Risk Mitigation
You understand the importance of the Intelligence Cycle, but what are the use cases of location-based intelligence within your organization? How can you better predict, analyze and act on security risks with real-time data? If you haven’t, review the first blog of our series “Intelligence Cycle: Tips and Tricks” to understand how following this process…
Keep Reading »Intelligence Cycle: Tips and Tricks
Risk monitoring, brand management, executive protection, crisis events, and more all depend on effective intel—uncertainty paralyzes action. Having the right intelligence, in real-time, is critical to mitigating risk and protecting your assets. Corporate security professionals can gain vast amounts of intel by gathering results from location-based intelligence. This three-part blog series will explore how organizations…
Keep Reading »Transaction Executions and the Security Industry
Editor’s Note: SIA member bloggers like Tom McMahon will address subjects of importance to other SIA members in new ongoing blog series. Hi everyone, allow me to introduce myself! By way of background, I am a managing director at Capstone Partners and among other things I head up the business services practice here. And while…
Keep Reading »