Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.

, ,

Navigating the Security Landscape: A Quick Guide to the Common Vulnerabilities and Exposures Program for Young Professionals

Introduction to CVE: What It Is and Why It’s Important In the ever-evolving security world, staying ahead of potential threats is vital. One impactful group in this ongoing battle is the Common Vulnerabilities and Exposures Program (CVE). Spearheaded by the MITRE Corporation, CVE is a crucial framework for identifying and managing vulnerabilities across various systems.…

Keep Reading »
, ,

Cybersecurity Incidents Lead to New Standards, Requirements

Axis Communications’ Wayne Dorris Discusses How Mirai, SolarWinds Have Pushed the United States and European Union to Act Major cybersecurity breaches have historically led to standards and legislation across the globe aimed at preventing similar incidents, up to and including the recent announcement from the White House about a new cybersecurity labeling program for Internet…

Keep Reading »
,

Guest Post: Embracing AI as a Positive Force for Progress in the Security Industry

Honeywell’s Don Morron discusses how the advent of generative AI presents a pivotal moment for the security industry. In the world of physical security, there has historically been a noticeable lag in adopting technological advancements, primarily due to a reluctance to trust technology and an aversion to change rooted in conventional thinking; however, as time…

Keep Reading »
, ,

Guest Post: Using Threat Intelligence Services Effectively and Holistically

Northland Controls’ Matthew Scharnett highlights how companies can identify goals and outcomes early on in the process, leverage healthy data and focus on a holistic adoption. With events like severe weather, active shooters and civil unrest impacting companies of all sizes, the ability to monitor a company’s specific environment for threats has proven to be…

Keep Reading »
,

Analyzing Data to Protect People and Assets

Intellicene’s Alan Stoddard Discusses How Intelligent Security Operations Can Support Comprehensive Risk Management Organizations across all sectors face an array of security and safety challenges. From workplace violence and terrorism to theft and natural disasters, the stakes are higher than ever before. It is clear that traditional approaches to protecting infrastructure, people and data are…

Keep Reading »
Cybersecurity Awareness Month
, , ,

Guest Post: Cybersecurity Awareness and a Call to Action

Cybersecurity Awareness Month 2023 recently concluded, and as part of its efforts during the month, the Security Industry Association (SIA) Cybersecurity Advisory Board created a series of helpful content, tips and guidance on key cybersecurity topics. In this blog from SIA Cybersecurity Advisory Board chair John Deskurakis – chief product security officer at Carrier – learn how…

Keep Reading »