Information Technology

Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
Gauging the Risks of Connected Security Devices
The growth of the Internet of Things (IoT) is engulfing many organizations. Big deal. Organizations have learned to cope with the “digital transformation” threatening to disrupt businesses since the ‘90s. IoT, however, is different. Leveraging proven concepts, technologies and business models like software as a service, cloud, mobile and big data, IoT is being adopted…
Keep Reading »SIA Cyber Onboarding Guide for Employees
These guidelines for employers and staff will help your company reduce cyber vulnerability, protecting your business and assets.
Keep Reading »SIA Commends Department of Commerce and Department of Homeland Security on Botnet Report
Report follows Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure SILVER SPRING, Md. – On May 30, 2018, the U.S. Departments of Commerce and Homeland Security released an action-oriented report on how the private sector and government can collaborate to mitigate against the threat of botnets and automated distributed attacks. The…
Keep Reading »GDPR and the Security Industry
The European Union’s (EU’s) General Data Protection Regulation (GDPR) on data privacy went into effect on May 25, 2018. The law gives consumers more control over how their data is collected and requires companies to justify what they do with this information. It also gives companies guidelines on what they can and cannot do with…
Keep Reading »GDPR’s Impact on the Security Ecosystem (Slides)
This slide deck from the Security Industry Association provides a broad overview of the European Union’s General Data Protection Regulation (GDPR), including specific details related to the management of personally identifiable information (PII).
Keep Reading »New Member Profile: ROG Security
New Security Industry Association (SIA) member ROG – based in Los Angeles, California – is a software technology company that develops artificial intelligence (AI) for the security guard industry. ROG provides its software as a service to security personnel anywhere in the world with its cloud delivery. SIA spoke with Jordan Lippel, ROG’s chief operating…
Keep Reading »SIA Technology Insights – Spring 2018
In every issue of SIA Technology Insights, we try to look to the cutting edge (and sometimes even to the bleeding edge) of security technology, to ensure you stay current with the steady whir of technology change. In that spirit, we start this issue off with two technologies – social media and facial recognition – that are seeing great adoption in the consumer space and poised to be adopted for security and safety applications.
Keep Reading »Cyber:Secured Forum Spotlight: Katie Moussouris and Bug Bounty Programs
While some physical security companies have begun penetration testing programs for their devices and systems, this practice isn’t nearly as widely used in physical security as it in other industries, namely the IT and Internet of Things fields. Considering the number of video surveillance cameras, access control systems and networked security devices in homes and businesses…
Keep Reading »Early Alerts Spur Action
Why corporate security teams rely on social media for real-time information Social media is transforming information distribution. Increasingly, it is where breaking news first appears. It’s where high-profile politicians make announcements, share opinions and shape public debate on the issues. It’s instantaneous, pervasive and truly global. And social media is deeply embedded in popular culture.…
Keep Reading »Converging Risks, Converging Solutions
The security world is changing. Physical and cybersecurity risks are converging. They’re maturing at different paces. In the security world, we’re always playing a bit of catch-up to business, but this feels a bit different. It’s not the typical cat and mouse game. There’s a speed and complexity to business needs, organizational structures and technology…
Keep Reading »