Observe and Report: Considerations for Evaluating Drone Detection Systems
Identifying and locating drones and their pilots can mitigate threats Consumer-grade unmanned aerial systems (UAS), also known as drones, promise to enhance lives and operations in significant ways. As with many new technologies, though, safety and privacy concerns abound. Inexpensive and widely available, drones flown by clueless or careless pilots can create public safety hazards.…
Keep Reading »Online and Under Attack
Cybersecurity must be built in to protect connected security products The December 2018 McAfee Labs Threat Report identified 45,000 new Internet of Things (IoT) malware variants in the third quarter of 2018. The number of attacks will continue to increase as more products are “IoT-enabled,” opening new communication pathways but also exposing vulnerabilities. Yet Gartner’s…
Keep Reading »Mitigating Risks From A to Z-Wave
A wireless standard delivers interoperability but could create vulnerability Zigbee and Z-Wave are wireless standards that enable home and building automation devices to communicate with each other without using Wi-Fi or Bluetooth. Z-Wave is lower power than Wi-Fi and has a longer range than Bluetooth. This article will examine the complexities and vulnerabilities introduced by…
Keep Reading »The More You Know: How New Technologies Can Improve Information Sharing & Efficiency
One of the biggest headaches for a security practitioner typically is finding the most up-to-date version of an organization’s security system floor plan or “as-built drawing.” Is it in an old PDF on a computer used by someone who has since left? Is it in the file cabinet gathering dust? Is there a system of…
Keep Reading »Hazard Counting: How Hardened Video Cameras Can Secure the Most Dangerous of Sites
Video surveillance technology is a key component of security plans for enterprise organizations. And nowhere is this more true than at oil and gas production sites, critical infrastructure facilities, and manufacturing locations that are considered “hazardous environments.” Here, protection, safety and security go hand-in-hand with operations management, and video technology is at the heart of…
Keep Reading »In the First Place You Look: Exploring Key and Asset Management
A key and asset management system can provide ROI by mitigating loss and theft How do you determine the return on investment (ROI) that comes from securing your company’s keys and assets? As a professional in the security industry, you start to realize just how many companies struggle to answer that question. It goes well…
Keep Reading »No Dark Cloud, Only Silver Lining
Cloud solutions provide multiple advantages over on-premises storage We have been talking about the cloud for a while, but the rate of adoption within the security industry has lagged significantly behind other sectors. That is starting to change as the cloud becomes a more viable option for mid-market, distributed and enterprise companies seeking to harness…
Keep Reading »At the Center of It All
Following a set of best practices can lead to a more effective GSOC There recently has been a renewed focus on the heart of an organization’s security posture – the global security operations center (GSOC). Gone are the days when the GSOC was an afterthought on the road to securing a space. Today’s GSOCs are…
Keep Reading »Artificial Intelligence, Real Security
AI has the potential to enhance multiple components of security systems When considering the challenges of ensuring life safety, improving physical security and increasing employee and contractor accountability, there are more options available than ever before. It is important to develop a comprehensive plan that includes layers of protection and utilizes the appropriate technology to…
Keep Reading »A Guide to Video Management Systems and Key Solutions They Provide
Beyond improvements in media storage and accessibility, video management systems offer customers a range of customizable software solutions, powered with standards-based technologies that are interoperable with various physical safety and security devices. This guide provides an outline for thought when analyzing system types and design for management of network security cameras. Video Management System Types…
Keep Reading »