Blog Archives




 
  • 8 keys to starting a trade secret protection plan

    By Paul Rothman - Monday September 10, 2012
    Caught a great educational session at ASIS today on proecting trade secrets....some really good stuff from former Dupont security chief Ray Mislock Jr., now with Pamir Consulting. Expect an in-depth article in early 2013 in STE outlining a strategic...
  • The business playing field for security dealers must be level

    By Geoff Kohl - Friday September 7, 2012
    The Electronic Security Association (ESA)  alerted the security industry of a court case occurring right now in Massachusetts that could be a watershed case for the industry. The issue is licensing and whether companies like Comcast and Verizon are...
  • Social media and mobile apps add to the mass notification arsenal

    By Paul Rothman - Thursday September 6, 2012
    Every September is National Preparedness month, a nationwide effort to encourage individuals, families, businesses and communities to work together and take action to prepare for emergencies. STE's recent special report, Crisis on Campus , actually gives...
  • 7 Years after Katrina: Making Progress in Continuity

    By Geoff Kohl - Friday August 31, 2012
    Those of you who know me may well recall how I devoted this column seven years ago to Hurricane Katrina and my personal experience of being on the Mississippi Gulf Coast (site of the tidal surge that destroyed most coastal towns) approximately 24...
  • The changing landscape of home security

    By Joel Griffin - Friday August 31, 2012
    With the exception of a subtle change here or there, the residential security market was relatively simple and straightforward for decades. A home owner looking to secure their property with an alarm system would call a dealer for an estimate. That dealer...
  • BYOD, not BYOB

    By Deborah L. O'Mara - Thursday August 30, 2012
    While visions of a long Labor Day weekend are in sight, we might be thinking about BYOB, not BYOD. Bring Your Own Device is what we should be thinking about, and a topic covered in our mobile surveillance story in the August issue of SD&I magazine, online...
  • The Wild West frontier of cyberspace

    By Joel Griffin - Friday August 24, 2012
    It seems like everyday there is gloomy news for those security professionals charged with the responsibility of keeping their organization’s computer networks safe. Whether it’s a data breach involving the theft of personal information or some new...
  • What's best for back-up storage of data?

    By Geoff Kohl - Wednesday August 22, 2012
    Wondering how to archive that security information (mug shots, stills from video surveillance, video surveillance feeds, etc.)? Scan through this guide to "The Lifespan of Storage Media" and find out what's going to die first and what will still be...
  • Retail lessons from a corrupted Apple store

    By Geoff Kohl - Wednesday August 22, 2012
    If youd ever had a question about which can be worse -- shoplifters or your own staff -- this Gizmodo story about corruption in an Apple store would answer that question. The report details internal theft scams like this one: "One Genius had a...
  • The Active Shooter What-if Games

    By Geoff Kohl - Friday August 17, 2012
    Threats evolve. So do we. I was hosting a speaker call this morning with a few people that represented different walks of life: Security consultant, police officer, SWAT team member, trauma surgeon, school training expert. We were discussing an upcoming...