SIA Cyber Onboarding Guide for Employees
These guidelines for employers and staff will help your company reduce cyber vulnerability, protecting your business and assets.
Keep Reading »SIA Technology Insights – Spring 2018
In every issue of SIA Technology Insights, we try to look to the cutting edge (and sometimes even to the bleeding edge) of security technology, to ensure you stay current with the steady whir of technology change. In that spirit, we start this issue off with two technologies – social media and facial recognition – that are seeing great adoption in the consumer space and poised to be adopted for security and safety applications.
Keep Reading »Data Privacy and Security Trends for 2018
This paper, produced by the Security Industry Association’s Data Privacy Advisory Board, explores some of the major data privacy and security trends for 2018 for professionals seeking an introduction to this critical issue.
Keep Reading »SIA Export Assistance Guide
The SIA Export Assistance Guide was created to assist SIA member companies exploring export opportunities or expanding their participation in trade. This guide provides a listing and helpful information concerning available export assistance programs offered by the federal government, as well as a global directory of industry associations that could offer assistance in navigating the security market in a specific country or region.
Keep Reading »SIA Cybersecurity Advisory Board Enterprise Security Recommendations
Recommendations from the SIA Cybersecurity Advisory Board for initiating an
enterprise cybersecurity strategy
Beginner’s Guide to Product and System Hardening
The SIA Cybersecurity Advisory Board recommends a few basic safeguards to help protect security products, systems and services against failure from cyber attacks.
Keep Reading »SIA Technology Insights – Fall 2017
Robot guards. Drone attacks. The Internet of Things. The security industry continues to evolve rapidly. And for good reason – the threats that we are defending against are changing just as quickly. Technology has always had both good and bad applications, and this edition of SIA Technology Insights provides multiple examples of that.
Keep Reading »SIA Technology Insights – Spring 2017
The security capabilities of drones, the role of artificial intelligence in security, and biometric technologies that include such advanced modalities as voice recognition and gait analysis. Even the articles about more “traditional” aspects of physical security, such as video surveillance, access control and intrusion detection, are vastly different than what would have been written a few years ago and feature analyses of how IT connections, mobility, analytics and comprehensive integration are turning devices into
powerful security solutions.
SIA Technology Insights – Fall 2016
Drones. Augmented reality. Event-driven intelligence. This is not your father’s security industry. Really, it’s not even your older brother’s. The pace of technological change in physical security seems only to increase, so much so that the very definition of the security industry is changing. A sector that includes the technologies listed above – each of which is addressed in this issue – and that overlaps more and more with cybersecurity is not the same as the one we knew not too many years ago. The ends remain the same – managing risk and deterring, detecting and defeating intruders – but the rapidly evolving means are altering the ways that we think about achieving those goals.
Keep Reading »SIA Technology Insights – Spring 2016
Some professionals in the electronic physical security industry – especially those who started their careers more than a few years ago – may feel a similar unfamiliarity when they look at the most technologically advanced systems today. Everything is on the network, and computers and data now have as much to do with securing a facility as cameras and card readers. The physical location cannot be secure unless the network is – and vice versa – which is why this edition of SIA Technology Insights is devoted entirely to cybersecurity.
Keep Reading »