• Home >
  • Back Issues >
  • Security Technology Executive >
  • SEPTEMBER-OCTOBER 2024
  • SEPTEMBER-OCTOBER 2024

    Critical Infrastructure
    Jeff Slotnick
    Data analysis is a tool that empowers organizations to make informed decisions, predict trends, and improve operational efficiency.
    Security Executives

    Security Data Intelligence is an Organization’s Best Risk Management Tool

    Organizations are now using what technology provides us to minimize the impact of risk
    Change has been the continuity of progress in how our security industry continues to learn, adapt, and evolve. Another observation that remains static is the struggle security practitioners have to gain a consensus or wield the influence to apply acceptable security practices.
    Security Executives

    How to Mitigate an Evolving Critical Infrastructure Threat Landscape

    Sept. 12, 2024
    There is a good, bad and ugly side to security strategies and risk planning in the CI sector.
    Credit: Rasi Bhadramani
    To address the limitations of conventional approaches to surveillance, VSaaS has emerged as a transformative approach to security system management.
    Video Surveillance Apps

    How Organizations Integrate VSaaS into Their Risk Management Strategies

    Sept. 12, 2024
    The technological advancement of VsaaS is a strategic imperative for organizations aiming to stay resilient
    Credit: imaginima
    Whether it’s a global manufacturer needing to manage and analyze vast amounts of video data in real-time or a large commercial retail chain requiring the capability to monitor access control and streamline security operations, the need for cloud and AI-powered solutions is not just significant, but urgent.
    Home

    The Future of Security with AI and Cloud-Native Platforms

    Sept. 12, 2024
    As AI and cloud technologies integrate into security practices, it will be increasingly crucial
    475182819
    bigstockbackviewofyoungbusinessman475182819
    Security Executives

    AI is a Critical Learning Experience

    Sept. 12, 2024
    As the business case continues to be made to migrate AI and machine learning into business operations, understanding the concepts of the AI learning curve and training your new...

    More content from SEPTEMBER-OCTOBER 2024

    Credit: teekid
    gettyimages154971102
    Security Executives

    An Emergency Plan without Exercise Has No Muscle

    Sept. 12, 2024
    You’ve told your boss that you’ve created an Emergency Action Plan compliant with OSHA, your state’s fire code and NFPA standards. Your boss then snaps, &ldquo...
    Credit: stuartmiles99
    gettyimages1048305450
    Cybersecurity

    5 Best Practices for Managing Endpoints on a Global Scale

    Sept. 12, 2024
    Managing hundreds or thousands of endpoints is hard enough when they're all in the same office or campus. But when you have endpoints scattered worldwide – as many global...
    Credit: alice-photo
    Creative #: 475114438
    Security Executives

    Confidentiality, Integrity and Availability (CIA) for Surveillance Video

    The CIA triad—Confidentiality, Integrity, and Availability—has been a foundational information security model for four decades. However, achieving these principles...
    Credit: adaniabertil
    Marcus Aurelius, the Emperor of Rome
    Security Executives

    Momento Mori and Premeditatio Malorum – Mindsets for Leaders

    Sept. 12, 2024
    I have been a student of Stoicism for some time. This ancient philosophy was born in Athens, Greece, in 300 BC and made famous through the writings of such philosophers as Seneca...
    Credit: sjharmon
    geek
    Security Executives

    What Do You Say You Do Here?

    Sept. 12, 2024
    Most of us can probably say we’ve seen the meme of the guy from Office Space looking into a cubicle and quizzing an employee about their role and functions. It’s a...