, ,

Creating a Cybersecure Physical Security Enterprise

Simplicity and convenience are the enemies of security This article is intended for executive and management personnel who may not have the technical expertise to fully evaluate physical security system installations, but who are nevertheless responsible for the installation and performance of these systems. All organizations that have any kind of physical facility must be…

Keep Reading »
, ,

Beginner’s Guide to Product and System Hardening

From the SIA Cybersecurity Advisory Board The SIA Cybersecurity Advisory Board recommends a few basic safeguards to help protect security products, systems and services against cyber attack. This is by no means an exhaustive list. Cybersecurity processes and technologies are constantly evolving along with the threats; the following can serve as the beginning for a…

Keep Reading »
Security Industry Association (SIA)
, , ,

The Importance of Practicing ‘Due Care’ in Cybersecurity

Taking appropriate precautions can prevent security equipment from being a cyber vulnerability Cybersecurity and physical security are becoming more and more connected. Everything from the cars people drive to the heating systems that warm their houses to the planes they fly in are increasingly controlled by interconnected computers. And, as a result, they are subject…

Keep Reading »
, , , ,

A Standard Response to IoT’s Security Challenges

Technical standards are essential to securing billions of connected devices The Internet of Things (IoT) is causing an explosion in the number of connected devices. Many of these will be deployed on networks that are also a part of the security fabric of our facilities, our infrastructure, and – literally – our way of life.…

Keep Reading »
, , , , , ,

IoT Makes New Security Partnerships Essential

Bringing physical security and IT security together can enhance both For several years now, security professionals have been a part of a remarkable convergence of two worlds – physical and digital. Security systems integrators are shifting from being strictly focused on hardware and electronics to taking into account services, software and networks, and security purchases…

Keep Reading »
, ,

A CEO’s Guide to Cybersecurity

Identifying and addressing vulnerabilities must be a priority Cybersecurity responds to leadership priorities just as finances and human resources do. Computers and networks come with flaws and vulnerabilities, as with all other aspects of a business, and these vulnerabilities enable hackers to achieve their goals. The CEO mitigates risk, regardless of domain, by exhibiting leadership…

Keep Reading »
, , ,

Becoming Predictive, Rather than Reactive

A holistic view of physical and logical identities can help to identify insider threats Current events have raised awareness of digital threats worldwide, bringing cybersecurity to the forefront of our global consciousness. It seems that hardly a day goes by without news of an attack and precious digital assets such as personal and financial data…

Keep Reading »