Posts Tagged ‘SIA Technology Insights’
Find articles published in the SIA Technology Insights journal, a twice-annual journal focusing on emerging security technologies, and authored by SIA members.
Observe and Report: Considerations for Evaluating Drone Detection Systems
Identifying and locating drones and their pilots can mitigate threats Consumer-grade unmanned aerial systems (UAS), also known as drones, promise to enhance lives and operations in significant ways. As with many new technologies, though, safety and privacy concerns abound. Inexpensive and widely available, drones flown by clueless or careless pilots can create public safety hazards.…
Keep Reading »SIA Technology Insights – Fall 2019
In every issue of SIA Technology Insights, we try to look to the cutting edge (and sometimes even to the bleeding edge) of security technology, to ensure you stay current with the steady whir of technology change. This edition examines the new world of security, where everything is online, machines are learning to perform tasks and threats can come from anywhere in the world.
Keep Reading »Don’t Miss the Spring 2019 Edition of SIA Technology Insights
The Security Industry Association (SIA) has released the spring 2019 edition of SIA Technology Insights, a semiannual journal that distills the most current thinking for applying today’s security technologies. The latest issue of the publication examines the new world of security, where everything is online, machines are learning to perform tasks and threats can come…
Keep Reading »Online and Under Attack
Cybersecurity must be built in to protect connected security products The December 2018 McAfee Labs Threat Report identified 45,000 new Internet of Things (IoT) malware variants in the third quarter of 2018. The number of attacks will continue to increase as more products are “IoT-enabled,” opening new communication pathways but also exposing vulnerabilities. Yet Gartner’s…
Keep Reading »Mitigating Risks From A to Z-Wave
A wireless standard delivers interoperability but could create vulnerability Zigbee and Z-Wave are wireless standards that enable home and building automation devices to communicate with each other without using Wi-Fi or Bluetooth. Z-Wave is lower power than Wi-Fi and has a longer range than Bluetooth. This article will examine the complexities and vulnerabilities introduced by…
Keep Reading »The More You Know: How New Technologies Can Improve Information Sharing & Efficiency
One of the biggest headaches for a security practitioner typically is finding the most up-to-date version of an organization’s security system floor plan or “as-built drawing.” Is it in an old PDF on a computer used by someone who has since left? Is it in the file cabinet gathering dust? Is there a system of…
Keep Reading »Hazard Counting: How Hardened Video Cameras Can Secure the Most Dangerous of Sites
Video surveillance technology is a key component of security plans for enterprise organizations. And nowhere is this more true than at oil and gas production sites, critical infrastructure facilities, and manufacturing locations that are considered “hazardous environments.” Here, protection, safety and security go hand-in-hand with operations management, and video technology is at the heart of…
Keep Reading »In the First Place You Look: Exploring Key and Asset Management
A key and asset management system can provide ROI by mitigating loss and theft How do you determine the return on investment (ROI) that comes from securing your company’s keys and assets? As a professional in the security industry, you start to realize just how many companies struggle to answer that question. It goes well…
Keep Reading »No Dark Cloud, Only Silver Lining
Cloud solutions provide multiple advantages over on-premises storage We have been talking about the cloud for a while, but the rate of adoption within the security industry has lagged significantly behind other sectors. That is starting to change as the cloud becomes a more viable option for mid-market, distributed and enterprise companies seeking to harness…
Keep Reading »At the Center of It All
Following a set of best practices can lead to a more effective GSOC There recently has been a renewed focus on the heart of an organization’s security posture – the global security operations center (GSOC). Gone are the days when the GSOC was an afterthought on the road to securing a space. Today’s GSOCs are…
Keep Reading »