October 2013

John McCumber is a security and risk professional, and author of Assessing and Managing Security Risk in IT Systems: A Structured Methodology, from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
Cybersecurity

So What is it I Do, Again?

Oct. 21, 2013
DHS job description leaves void
Steve Lasky is the Editorial Director of Southcomm Security Media, which includes print publications SD&I, Security Technology Executive and Locksmith Ledger International – as well as the world’s top security web portal, SecurityInfoWatch.com. He is a 30-year veteran of the security industry and a 26-year member of ASIS. Contact him at slasky@southcomm.com.
Secured Cities

My Point of View: Secured Cities is More Than a Concept

Oct. 21, 2013
Secured Cities Conference the best of public-private partnership initiatives
Ray Bernard, PSP, CHS-III, is a leading security consultant and author, who over 26 years has led many noteworthy security projects for international airports, nuclear disarmament facilities, sports stadiums, water districts, energy utilities, hotels, manufacturing plants and multiple-tower high-rise facilities (www.go-rbcs.com). Follow him @RayBernardRBCS
Home

Why Do I Need a Technology Roadmap?

Why Do I Need a Technology Roadmap?
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Home

Tech Trends: Thermal Imagers: Shrink Wrapped

Oct. 21, 2013
Thermal imaging is based on heat sensing from a surveillance target
Kevin Beaver is a consultant with Atlanta-based Principle Logic LLC (www.principlelogic.com). He has authored/co-authored 11 books on information security, including Hacking for Dummies, Implementation Strategies for Fulfilling and Maintaining IT Compliance, and the Security on Wheels audio books and blog (www.securityonwheels.com). Follow him on Twitter, @kevinbeaver or connect to him on LinkedIn.
Healthcare

Get With IT: Are Obamacare’s Health Insurance Exchanges Secured?

Oct. 21, 2013
Government officials freely admit the security requirements have not been achieved.

More content from October 2013

While 10 years may have passed since the 2003 blackout, the threat of power outages has not diminished. On the contrary, it is an ongoing — and growing — security threat. The number of large outages (defined as those that impact more than 50,000 individuals) has been on the increase since the early 1990s. News headline-making outages are just the tip of the iceberg; it is in fact the smaller and more localized power emergencies that have the greatest financial and security impact on properties and businesses. Consider this: Last year’s damaging and disruptive hurricane hybrid Superstorm Sandy left approximately 8.5 million people without power. But that is only one chapter in the 2012 story. Because, all told, outages impacted more than 40 million people last year. Without adequate preparation and protection, even a small outage can have devastating consequences for businesses and lead to dangerous and avoidable security exposures.
Home

Lights Out: Lessons Learned from the Great Northeast Blackout

Oct. 21, 2013
Basic steps needed to help prevent power outages
Navigant Credit Union has 13 locations. Branches are typically around 4,000 square feet, featuring the usual configuration of drive-through lanes, ATMs, night depositories and other member-service areas. Cameras watch it all, with pan-tilt-zoom (PTZ) cameras “sweeping” the parking lots. Inside, cameras monitor who enters the vault lobby, and view each teller line.
Retail

When Continuity Counts

Oct. 21, 2013
Video systems are one way the financial market can leverage technology
As Axis Communications' Security Industry Liaison, Steve Surfaro consults with a number of industry associations, including ASIS, BICSI, SIA and NBFAA/ESA, on physical security technology innovation and best practice adoption.
Home

Forensic Video: Your Best Investigation Tool

Oct. 21, 2013
Understanding personnel traffic flow will often help camera placement and ultimately the video forensic-review process
The ergonomic design of the Enterprise Security Command Center is strikingly evident. Everything is very well situated so that the operators can sit in a comfortable environment for long periods of time, and supervisors can have a clear view of operators and the activity displayed on the video wall.
Critical Infrastructure

The Power of PSIM Protects Utility Giant’s Critical Infrastructure

Oct. 21, 2013
Duke Energy is one of the first electric power companies in the U.S. to successfully deploy PSIM
Dan Cremins is director of product management with March Networks.
Retail

What to Bank on when it comes to Video Surveillance

Oct. 21, 2013
Video surveillance is one of the most important components of a financial institution’s security infrastructure
Photo: FLIR Systems
FLIR recently announced a thermal imaging camera small enough to fit into a smartphone.
Night-Vision, Thermal & Infrared Cameras

Tech Trends: Thermal Imagers Feeling the Shrink

Sept. 17, 2013
Nearly everything about infrared is decreasing — including size and, most importantly, cost