Blog Archives




 
  • 7 Years after Katrina: Making Progress in Continuity

    By Geoff Kohl - Friday August 31, 2012
    Those of you who know me may well recall how I devoted this column seven years ago to Hurricane Katrina and my personal experience of being on the Mississippi Gulf Coast (site of the tidal surge that destroyed most coastal towns) approximately 24...
  • The changing landscape of home security

    By Joel Griffin - Friday August 31, 2012
    With the exception of a subtle change here or there, the residential security market was relatively simple and straightforward for decades. A home owner looking to secure their property with an alarm system would call a dealer for an estimate. That dealer...
  • BYOD, not BYOB

    By Deborah L. O'Mara - Thursday August 30, 2012
    While visions of a long Labor Day weekend are in sight, we might be thinking about BYOB, not BYOD. Bring Your Own Device is what we should be thinking about, and a topic covered in our mobile surveillance story in the August issue of SD&I magazine, online...
  • The Wild West frontier of cyberspace

    By Joel Griffin - Friday August 24, 2012
    It seems like everyday there is gloomy news for those security professionals charged with the responsibility of keeping their organization’s computer networks safe. Whether it’s a data breach involving the theft of personal information or some new...
  • What's best for back-up storage of data?

    By Geoff Kohl - Wednesday August 22, 2012
    Wondering how to archive that security information (mug shots, stills from video surveillance, video surveillance feeds, etc.)? Scan through this guide to "The Lifespan of Storage Media" and find out what's going to die first and what will still be...
  • Retail lessons from a corrupted Apple store

    By Geoff Kohl - Wednesday August 22, 2012
    If youd ever had a question about which can be worse -- shoplifters or your own staff -- this Gizmodo story about corruption in an Apple store would answer that question. The report details internal theft scams like this one: "One Genius had a...
  • The Active Shooter What-if Games

    By Geoff Kohl - Friday August 17, 2012
    Threats evolve. So do we. I was hosting a speaker call this morning with a few people that represented different walks of life: Security consultant, police officer, SWAT team member, trauma surgeon, school training expert. We were discussing an upcoming...
  • Protecting against Mother Nature at sporting events

    By Joel Griffin - Friday August 10, 2012
    In recent years, there has been an increased emphasis placed on increasing security at sporting venues across the country. Whether it’s through the installation of security cameras or the use metal detectors, sports leagues want fans to know that they...
  • Integrator sessions at ASIS

    By Deborah L. O'Mara - Wednesday August 8, 2012
    If you are heading to Philadelphia next month, I’m sure you’ll want to partake in the famous Philly cheese steak sandwich at the nearby Reading Terminal, but perhaps you’ll want more? In that case, you will want to know about the integrator tracks...
  • Is data more vulnerable in the cloud?

    By Joel Griffin - Wednesday August 8, 2012
    With ability to lighten data storage requirements on the network, more and more organizations in recent years have started using the cloud to store sensitive information. Cloud technology has been of particular interest for security professionals, given...