July-August 2017

By Lupus in Saxonia - Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=52345826
Concrete blocks in the city center of Dresden during the 2016 German Unity Day Celebrations.
Physical Hardening

Soft Targets: Stemming the Tide of Vehicle Ramming Attacks

Aug. 14, 2017
University campuses are not immune to the threat and require a proactive plan to mitigate risk
Ray Bernard, PSP CHS-III, is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities (www.go-rbcs.com). Mr. Bernard is a Subject Matter Expert Faculty of the Security Executive Council and an active member of the ASIS International member councils for Physical Security and IT Security.
Video Surveillance

Convergence Q&A: When and Why Should We Move to a Cloud-Based Security System?

Increasingly I am hearing about IT departments asking what direction physical security system technology is moving in, and where cloud-based applications or systems fit on security...
Image Courtesy of BigStock.com
Complexity escalates risk. Breaking down a network upgrade into phases based on priority, impact, and cost can be considered positive to simplify the project and address risk.
Computer and Network Security Hardware

Is It Time to Upgrade the Network?

Aug. 14, 2017
CSO and CISO must work in tandem to ensure organizational security and business goals jibe
Russel Van Tuyl is a security analyst and Purple Team leader for Sword & Shield Enterprise Security. His primary role consists of conducting network vulnerability assessments, penetration tests, and web application assessments but also performs firewall configuration audits, wireless assessments, and social engineering engagements to include both phishing and pretexting. He has more than 10 years of experience in the technical field in roles such as database design, field device support, help desk, IT asset management, programming, and information security. He has obtained several Global Information Assurance Certifications (GIAC). These certifications include GIAC Security Essentials Certification (GSEC), GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), and GIAC Web Application Tester (GWAPT). Additionally, he has completed the Penetration Testing with Kali course and holds a CompTIA A+ certification.
Computer and Network Security Software

Purple Team Assessment Service: A Collaborative Approach to Security Assessments

Aug. 14, 2017
In the realm of information security, there is a growing movement to enhance security assessments with a more collaborative model of testing. This approach supplements the traditional...
Image Courtesy of BigStock.com
, K-12 schools need knowledgeable and trained administration and IT departments that can ensure each student and staff members’ online safety.
Information Security

Successfully Adopting Technology in the Classroom

Aug. 14, 2017
Deploying, managing and securing devices in K-12 schools can often feel daunting

More content from July-August 2017

Image Courtesy of BigStock.com
University campuses, by definition, pose complex challenges for VMS system design.
Video Surveillance

Planning for Cost-Effective VMS Solutions on University Campuses

Aug. 14, 2017
Administrations can lower TOC of campus-wide surveillance without sacrificing coverage
iStock 000014260935XXLarge 5991bd7bd9708
Mass Notification Solutions

Evaluating Your Emergency Mass Notification System

Aug. 14, 2017
Evolving emergency communications systems becoming easier to use and deploy
(Photo courtesy bigstockphoto.com)
Having a mass notification system is a critical component in ensuring organizational staff is safe during a wide variety of emergencies.
Emergency Communications Equipment

Planning and Implementing a Campus Mass Notification System

Aug. 9, 2017
Emergency communication is a critical element of any disaster preparedness program
AC2017 cover 596ccf91c879c
Access Control

Access Control Trends & Technology 2017

July 17, 2017
A special bonus supplemental publication to Security Dealer & Integrator (SD&I), Security Technology Executive (STE) and Locksmith Ledger International magazines
Photo: Nightingale Security
Nightingale's drones transmit video surveillance images thanks to integrations with several VMS products.
Threat Detection, Imaging & Inspection

Tech Trends: Drone Zone

July 17, 2017
As fast as the technologies are taking off, anti-drone counter-measures are there to take them down