Thursday, 31 August 2017

Product Spotlight: Audio Solutions 2017

Security technology may often focus on visually-based technology, but audio options – from intercoms to mass notification to audio detection – are fast becoming core pieces of a robust security system.



source http://www.securitymagazine.com/articles/88257-product-spotlight-audio-solutions-2017

Building a Better Boardroom Presentation

You know the signs you’re losing your audience – glazed eyes, extended smartphone use, yawns, repeated glances at watches and clocks.



source http://www.securitymagazine.com/articles/88298-building-a-better-boardroom-presentation

Bosch Security – Essential Video Analytics – Queuing Notification

All of Bosch’s IP 6000 and coming IP 4000 to IP 5000 cameras have built-in Essential Video Analytics as standard which is ideal to repurpose captured video data for business analytics like people counting or analyzing customer behavior in retail.



source http://www.securitymagazine.com/articles/88300-bosch-security-essential-video-analytics-queuing-notification

When Critical Infrastructure Encounters Civil Unrest

The controversy surrounding the Dakota Access Pipeline (DAPL) project and recent environmental protests at worksites has led to international attention and a growing concern for critical infrastructure owners and operators.



source http://www.securitymagazine.com/articles/88297-when-critical-infrastructure-encounters-civil-unrest

Lessons on Entertainment Security and Executive Protection After Manchester

If the Islamic State terrorist organization deliberately targeted Ariana Grande or her May 22, 2017, concert, new challenges will be presented for security professionals who provide close quarters protection to entertainment stars.



source http://www.securitymagazine.com/articles/88296-lessons-on-entertainment-security-and-executive-protection-after-manchester

Drones: Nuisance or Serious, Immediate Threat?

As drones become easier to acquire, they pose an increasing threat to public buildings, events and people.



source http://www.securitymagazine.com/articles/88295-drones-nuisance-or-serious-immediate-threat

Timeline of Counter-Drone Activity in the U.S. Government

There are a number of legislative committees and groups working on counter drone legislation, evaluating existing technology and supporting the development of new technology. Here are some of the major highlights in counter drone research and legislation since the early 2000s.



source http://www.securitymagazine.com/articles/88294-timeline-of-counter-drone-activity-in-the-us-government

Companies are Failing to Get Ahead of the GDPR

The upcoming implementation of the Global Data Protection Regulation (GDPR) in May 2018 has many security experts on edge.



source http://www.securitymagazine.com/articles/88293-companies-are-failing-to-get-ahead-of-the-gdpr

Surveillance Means Savings for School Districts

As the 2017-18 school year gets underway, many school districts are testing out newly installed and upgraded security systems.



source http://www.securitymagazine.com/articles/88292-surveillance-means-savings-for-school-districts

Fraud, Cybersecurity and Banking in Canada

Since the late ‘90s in Canada, bank robberies have been on a decline; between 1998 and 2008, such incidents decreased by 38 percent, according to a report by Statistics Canada.



source http://www.securitymagazine.com/articles/88291-fraud-cybersecurity-and-banking-in-canada

Where Opportunity Knocks

It’s not working, but it can. Despite government and private sector efforts to retain more women in the global cybersecurity profession, women are sorely underrepresented in the industry.



source http://www.securitymagazine.com/articles/88290-where-opportunity-knocks

Increasing Liability for Enterprises: Terrorism, Civil Unrest, Kidnappings, Crime, Natural Disasters

The world has become significantly more dangerous for business travelers and especially for those who are given short or long-term assignments away from their home base of operations. Dramatic changes in conditions across the domestic landscape as well as across the world have driven significant enhancements to corporate travel security programs.

source http://www.securitymagazine.com/articles/88289-increasing-liability-for-enterprises-terrorism-civil-unrest-kidnappings-crime-natural-disasters

Recruiting for Security Leadership Success

Companies increasingly want a better understanding of what contributes to predicting performance in possible new hires. They want to better understand a candidate’s motivation, values, beliefs and goals in addition to their competencies. This allows the hiring organization to better assess whether there are personality characteristics and traits that, when pushed to extremes, will impede the individual’s ability to be effective in executing the responsibilities of the position.

source http://www.securitymagazine.com/articles/88288-recruiting-for-security-leadership-success

Leadership and Culture

As a leader, you get very few opportunities to create a culture of discipline around the goals and vision for your team. Over the last few years, this core leadership trait of “engagement” has become an imperative. How can you invite your employees into your vision and mission and have them make it their own?

source http://www.securitymagazine.com/articles/88287-leadership-and-culture

How New York is Shaking Up Cybersecurity

Something potentially groundbreaking is happening in New York, and its impact is being felt globally. Still, if you’re not in the financial services industry, and specifically regulated by the New York State Department of Financial Services (NYDFS), you may have missed it. What is this change? In short, it’s the first of what may become a wave of stringent state cybersecurity regulations that impose “minimum standards” on industry.

source http://www.securitymagazine.com/articles/88286-how-new-york-is-shaking-up-cybersecurity

Countering the Effects of New Age Terrorism on Business and Travel

What is ‘new age’ terrorism? In a paper addressing changes in terrorism, Dr. Arvind Adityaraj states: “…the magnitude of violence, lethality and the extensive use of technology to disseminate ideology, indoctrinate, and mold the mind of the youth in their fold…[with] business-like network structures clearly point towards the significant departure of old terrorism.”

source http://www.securitymagazine.com/articles/88285-countering-the-effects-of-new-age-terrorism-on-business-and-travel

European Union Introduces Widespread Rules for Cybersecurity

Firms supplying essential services, e.g. for energy, transport, banking and health, or digital ones, such as search engines and cloud services, will have to improve their ability to withstand cyberattacks under the first EU-wide rules on cybersecurity.

source http://www.securitymagazine.com/articles/88284-european-union-introduces-widespread-rules-for-cybersecurity

Call for Military Data to Be Shared with Law Enforcement

Details of more than 18,000 Foreign Terrorist Fighters have now been shared via Interpol’s network with an increasing amount being sourced from the conflict zones. Biometric data such as photos, fingerprints and DNA profiles have already led to the positive identification of terrorists around the world, including via facial recognition.

source http://www.securitymagazine.com/articles/88283-call-for-military-data-to-be-shared-with-law-enforcement

Biometric Solution to Irregular Migration

The International Organization for Migration is working on introducing a Regional Biometric Data Exchange Solution (RBDES) to countries around the world in an effort to address irregular migration. The RBDES will enable law enforcement agencies to exchange biometrics data in a fast and secure way to verify the identities of travelers at borders. The system does not however store biometric data.

source http://www.securitymagazine.com/articles/88282-biometric-solution-to-irregular-migration

Most Countries without Cybersecurity Strategy

Only about half of all countries have a cybersecurity strategy or are in the process of developing one, the International Telecommunication Union reported in its second Global Cybersecurity Index.

source http://www.securitymagazine.com/articles/88281-most-countries-without-cybersecurity-strategy

China Creates Secure Communications Network

China is to use quantum cryptography to create an “unhackable” communications network. Using the network, some 200 users from the military, government, finance and electricity sectors will be able to send messages without the concern that others may be able to read them.

source http://www.securitymagazine.com/articles/88280-china-creates-secure-communications-network

Cooperation at Sea to Combat Maritime Attacks

The Malaysian Coast Guard (MCG) and Australian Border Force (ABF) have completed Operation Redback VIII; an on-water operation to combat maritime security threats facing both nations, including people smuggling and human trafficking.

source http://www.securitymagazine.com/articles/88279-cooperation-at-sea-to-combat-maritime-attacks

UK Hospitals Receive Funding for Cybersecurity

Hospitals in the UK are to be given £21 million to improve data and cybersecurity, taking the current level of government investment in this area to over £50 million. The £21 million cash injection follows a review into hospital cybersecurity, and it will be directed to the UK’s 27 major trauma centers including those that dealt with the aftermaths of recent terrorist attacks in Manchester and London.

source http://www.securitymagazine.com/articles/88278-uk-hospitals-receive-funding-for-cybersecurity

Ethics and Compliance Training Remains a Challenge from the Boardroom Down

Board training is a vital aspect of effective ethics and compliance programs, but fewer organizations are providing training to their board members – in 2017, only 44 percent of organizations are providing this education, compared to 58 percent in 2016. According to the NAVEX Global 2017 Ethics & Compliance Training Benchmark Report, only 17 percent of new directors received ethics and compliance training, and only one-fourth of organizations cover cybersecurity and cyber risk with the board.



source http://www.securitymagazine.com/articles/88277-ethics-and-compliance-training-remains-a-challenge-from-the-boardroom-down

School District Increases Safety and Reduces Its Carbon Footprint with Axis’ Lightfinder Technology

Rock Hill, S.C., School District installed a system of video surveillance cameras that operate in low light, allowing a “campus blackout” strategy to deter vandalism and save energy.



source http://www.securitymagazine.com/articles/88267-school-district-increases-safety-and-reduces-its-carbon-footprint-with-axis-lightfinder-technology

Creates Zones for Targeted Audio Announcements

These Power over Ethernet networked speakers – available in ceiling or cabinet versions – are high-sensitivity full-range loudspeakers that offer quality background music playback and have the ability to make clear announcements



source http://www.securitymagazine.com/articles/88264-creates-zones-for-targeted-audio-announcements

Built for Easy Ceiling Installation and Configuration

This two-way/talk-back audio speaker is a complete, shallow-depth, lightweight, 2’x2’ self-contained unit built to be dropped into an existing ceiling grid



source http://www.securitymagazine.com/articles/88263-built-for-easy-ceiling-installation-and-configuration

Combines Phone, Keyless Entry, Cameras and More

This vandal-resistant Video over IP (VoIP) entry phone system packs a lot of function into a small footprint



source http://www.securitymagazine.com/articles/88262-combines-phone-keyless-entry-cameras-and-more

Transfers Emergency Text Messages to Voice Announcements

This SMS/text to speech amplifier transfers text messages directly to voice announcements on speakers and pacing systems, so schools, enterprises, administrators, dispatchers and first responders can gain instant communication to their audience in seconds.



source http://www.securitymagazine.com/articles/88261-transfers-emergency-text-messages-to-voice-announcements

Focuses on Intelligibility, Scalability, Flexibility and More

This next-generation IP distributed communications platform is built to provide intelligible voice audio while supporting high availability, scalability, reliability, maintainability and cyber defensibility.



source http://www.securitymagazine.com/articles/88260-focuses-on-intelligibility-scalability-flexibility-and-more

Cybersecurity is Standard Business Practice For Large Companies

More than 90% of large US companies with 500+ employees have a cybersecurity policy in place to protect them from both real and anticipated threats.



source http://www.securitymagazine.com/articles/88301-cybersecurity-is-standard-business-practice-for-large-companies

Dear Mom & Dad: Here's What I Mean by "Business Continuity"

In the simplest sense, the goal of business continuity is to enable an organization to continue fulfilling its mission, vision and objectives, even during the worst of circumstances. Regardless of what Murphy’s Law, mother nature, or those with bad intentions throw our way, we have prepared our organization to succeed.



source http://www.securitymagazine.com/articles/88299-dear-mom-dad-heres-what-i-mean-by-business-continuity

Tuesday, 29 August 2017

What’s Worrying Today’s CSO?

Today's Chief Security Officers (CSOs) are worried about their investment, but more than that, they're worried about preserving employee safety, the safety of their data and the ability of their systems to integrate fully.

source http://www.securitymagazine.com/blogs/14-security-blog/post/88275-whats-worrying-todays-cso

Understanding the Internet of Things

The proliferation of Internet of Things (IoT) devices is greatly expanding the ecosystem in which physical security lives, opening up exciting new integration possibilities and business opportunities within the enterprise market.

source http://www.securitymagazine.com/articles/88276-understanding-the-internet-of-things

Failing to Communicate is a Recipe for Failure

Not that long ago, “major” events seemed relatively rare and seared themselves into the public’s consciousness. People remembered exactly where they were when JFK was assassinated, when the first plane struck the Twin Towers on 9/11, and when a gunman opened fire at Sandy Hook Elementary School.

source http://www.securitymagazine.com/articles/88274-failing-to-communicate-is-a-recipe-for-failure

Rapidly Deployable Beyond-the-Fence Detection

Physical protection of electrical substations is much more critical than simply guarding against copper theft. Recent terrorist attacks on substations and the potential for simultaneous attacks across the U.S. put the entire country at serious risk for major power interruption.

source http://www.securitymagazine.com/articles/88273-rapidly-deployable-beyond-the-fence-detection

Improving Guarding with Data

Bringing hard science to an industry measured by soft skills and judgement leads to less subjectivity and more transparency in management, as well as overall improvement in your enterprise’s guard force.

source http://www.securitymagazine.com/articles/88272-improving-guarding-with-data

Monday, 28 August 2017

Background Check Backlog Leads to Challenges for Government Job-Seekers

The federal government is facing a vast backlog of people seeking security clearances, as more than 700,000 applicants are waiting on background checks. 



source http://www.securitymagazine.com/articles/88271-background-check-backlog-leads-to-challenges-for-government-job-seekers

TSA Projected to Seize Record Number of Firearms at Airports in 2017

The Transportation Security Administration is on track to see a record number of passengers bringing guns to U.S. airports this year, with a surge in gun collections at security checkpoints in July, according to the Washington Examiner.



source http://www.securitymagazine.com/articles/88270-tsa-projected-to-seize-record-number-of-firearms-at-airports-in-2017

Friday, 25 August 2017

Thursday, 24 August 2017

US Government Ranks #16 out of 18 Industries in Cybersecurity

SecurityScorecard’s annual U.S. State and Federal Government Cybersecurity Report paints a very grim picture of the government’s cyber health status.



source http://www.securitymagazine.com/articles/88268-us-government-ranks-16-out-of-18-industries-in-cybersecurity

Passengers Struggle to Get Reimbursed for Damaged or Lost Luggage

Airline passengers face a tough time getting reimbursed by the Transportation Security Administration (TSA) for lost, damaged or stolen items, according to a new study.



source http://www.securitymagazine.com/articles/88266-passengers-struggle-to-get-reimbursed-for-damaged-or-lost-luggage

Wednesday, 23 August 2017