Feb-March 2018

More content from Feb-March 2018

Image Courtesy of BigStock.com
Because of the risk and security intricacies involved in a large merger or acquisition, the CSO and senior security team must assume multiple leading roles: consultant, mentor, facilitator and arbitrator.
March 13, 2018
CSOs Scott Soltis and Dan Colin share their keys to success when it comes to creating a cohesive security plan among newly integrated companies
(Image courtesy bigstockphoto.com/Rawpixel.com)
The myriad security challenges presented by today's threat landscape requires corporate boards to be proactive in putting together a comprehensive risk mitigation strategy that protects their organization on multiple fronts.
March 13, 2018
It has been a tradition at Security Technology Executive magazine over the last 28 years to rely on trusted advisors to help steer the editorial direction of the publication, ...
Mc Cumber John 10531637 jpg
March 13, 2018
I have been blessed in my long career in what is now known as cybersecurity. When I started in 1988, it was called CompuSec by the Department of Defense who needed a way to distinguish...
Image Courtesy of BigStock.com
In most cases, active shooters use firearms and there is no pattern or method to their selection of victims.
March 13, 2018
No employer can afford to treat the risk of a violent workplace attack lightly
Image Courtesy of BigStock.com
The challenge to the end user is two-fold, not only how to structure a viable storage solution, but how to address the larger challenge of managing the growing volume of unstructured data.
March 13, 2018
A multi-tier approach is a great way to get the capacity you need at a lower cost
Image Courtesy of BigStock.com
A robust protective intelligence program, when combined with an educated and alert workforce provide a solid foundation upon which security managers can build a proactive security program that keeps them all left of the boom.
March 13, 2018
Security professionals must create an inclusive culture of awareness and preparedness to meet organizational threats
violenceste4 5aa6962a65464
Workplace violence is a traumatic event that is occurring with increasing frequency
Image Courtesy of BigStock.com
Due to the sensitive nature of healthcare information, the cyber threat will always be a prioritized concern for all healthcare security executives.
March 13, 2018
Security executives will need to rethink their approach to mitigating risk in tomorrow’s threat landscape
Write to Ray about this column at ConvergenceQA@go-rbcs.com. Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Ray is an active contributor to the educational activities ASIS IT Security and Physical Security councils. In 2018 IFSEC Global listed Ray as #12 in the world’s top 20 Security Thought Leaders. For more information about Ray and RBCS go to www.go-rbcs.com or call 949-831-6788. Ray is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS.
I constantly receive this same question at security conferences, and I hear them in discussions whenever the subject of camera management is raised by people who are responsible...
(Image courtesy bigstockphoto.com)
Public-sector problems with ransomware have been at a low simmer for a while, with 35 state and local governments reporting problems in 2014, according to the Multi-State Information Sharing and Analysis Center, an organization that tracks cybersecurity issues for states and localities. But in 2015, the FBI warned that the problem is on the rise -- growing 114 percent in 2014 -- and said that unlocking the files is so difficult that the agency often suggests just paying the ransom.
Studying the history of ransomware will help organizations better prepare for an attack
(Photo courtesy bigstockphoto.com/sudok1)
Despite the fact that many healthcare institutions have implemented the latest operating systems of their main user devices and services in the network, many fail to ensure that medical devices have the most up-to-date operating system and/or they fail to change the default settings that come with these devices. These minor maintenance lapses leave the door wide open for attackers to exploit these existing vulnerabilities and security gaps.
March 13, 2018
Cybersecurity teams at hospitals have a lot on their plates. Not only do they have to worry about the traditional cybersecurity challenge of maintaining an enterprise network ...
Sielox logo 5a96d8f80732a
Feb. 28, 2018
Enhances value proposition and cost efficiency for integration partners
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Feb. 13, 2018
A closer look at the a few of the hot gunshot detection products on the market
(Image courtesy Hanwha Techwin America)
Hanwha Techwin America's Wisenet WAVE is a new VMS (Video Management System) designed to support the advanced features, and onboard video analytics that are unique to Hanwha cameras.
(Image courtesy bigstockphoto.com/tombaky)
SecurityInfoWatch.com recently convened a panel of industry experts to get their thoughts on the current state of access control and where the market is headed in 2018 and beyond.
Jan. 5, 2018
Industry experts share their predictions for the year ahead in this exclusive SIW roundtable
(Photo courtesy FLIR Systems)
FLIR Systems' new FB-Series ID thermal fixed bullet camera.
Ca4 K Mobile App
Amityville, NY – Continental Access announced the new release of CA4K v1.0 of its new Enterprise Access Control & Security Management Platform, integrating access control, wireless...