Information Technology

Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
SIA RISE Profile: Tim Wenzel of Facebook
Read our interview with Tim Wenzel, CSPM®, Program Manager, Special Projects & Residential Security, Facebook, as the Security Industry Association (SIA) spotlights a young professional on the RISE! Are you a young security professional under 40? We want your story! Contact Bryan Miller at bmiller@securityindustry.org to be featured in a monthly profile! What first got…
Keep Reading »SIA RISE Profile: Joel Hosino of Microsoft
Read our interview with Joel Hosino, Security Project Manager, Microsoft, as the Security Industry Association (SIA) spotlights a young professional on the RISE! Are you a young security professional under 40? We want your story! Contact Bryan Miller at bmiller@securityindustry.org to be featured in a monthly profile! What first got you interested in security and…
Keep Reading »Making Sense of Where Physical Security and Cybersecurity Meet
When stepping back and taking a broad view of the security market, I find one of the greatest opportunities in our space is to simply translate technology to nontechnical groups, or to translate real pain points to entrepreneurial solutions crafters. One such case in point is the connectivity between physical and cybersecurity. Even the most…
Keep Reading »Encryption Technology Provides Strong Network Defense
It is said that when Julius Caesar sent messages to his close acquaintances, he didn’t trust the messengers. To ensure privacy, he encrypted the message by replacing every A with a D, every B with an E, and so on through the alphabet and only someone who knew the “shift by 3” rule could decipher…
Keep Reading »What a DDoS Attack on Spotify Can Teach Us About Cybersecurity Hardening
Last Friday my Spotify stopped working. If you’re like me, the workday goes by a little easier with some headphones in, listening to Drake or Sturgill or Taylor Swift—whatever gets you ready for your weekend—but on this Friday my Spotify wasn’t working. It wasn’t until earlier this week that we learned that the reason why…
Keep Reading »Recommendations for Initiating an Enterprise Cybersecurity Solution
SIA Cybersecurity Advisory Board today released, “Recommendations for Initiating an Enterprise Cybersecurity Solution,” a brief listing of executive level recommendations to serve as a starting point for developing a comprehensive cyber-risk strategy. (Read the document online here.) The Security Industry Association (SIA) published the recommendations as part of its efforts to raise awareness of cybersecurity…
Keep Reading »The Ever-Expanding Role of Mobile in Access Control
It’s a safe bet to assume that at any given time, your smartphone is within arm’s reach. For many—if not most—of us, these devices keep us connected to our work from anywhere, remind us of appointments, provide occasional entertainment and much more. Now, mobile technology is also playing a key role in critical security functions,…
Keep Reading »Video Storage Wars
Hyper-convergence technology can simplify surveillance storage and enhance security The physical security systems and devices of today are more connected via LANs and the Internet than ever before. This extension of the network creates great opportunities, such as the growth of the Internet of Things (IoT), but it also creates additional vulnerabilities. Any IP-enabled device…
Keep Reading »Because You Can Never Be 100% Cybersecure
Effective use of strategies for countering attacks can minimize risk When was the last time you changed your password for your online bank account? Your email? Your social media accounts? How about your online shopping accounts or the myriad other login credentials that make up your digital life? Has it been a few months? Maybe…
Keep Reading »Augmented Reality is for More than Capturing Pokémon
When combined with IoT, the technology could have a big impact on security In 2016, Pokémon GO captured the mobile gaming world by becoming the most popular application in both the Apple and Android app stores, with more than 100 million downloads within the first few weeks of its public release in early July. The…
Keep Reading »