Nov-Dec 2017

Image Courtesy of BigStock.com
Popular services like Uber have the ability to utilize location-based services through the use of an app.
Emergency Communications Equipment

Why can Uber find me but emergency services can't?

June 6, 2018
Examining how emergency services can keep up with and better leverage modern day technology
Photo Courtesy of Mead & Hunt
At 468,000 SF and 1,200 beds, the Sedgwick County ADF is the largest correctional facility in the state of Kansas. More than 25 years old, the original proprietary door control systems were failing and the obsolete security system was in serious need of an upgrade and required replacement.
Access Control

Total retrofit presents challenges for collaborative project team

Dec. 15, 2017
Sedgwick County correctional facility project named top security project of 2017 with Elliot A. Boxerbaum award
Image Courtesy of BigStock.com
The CIP standards and requirements address the security of perimeters and the protection of critical assets, including training, security management and disaster recovery planning.
Physical Hardening

CIP Standards Work to Protect Power Grid

Dec. 15, 2017
A mix of new and conventional technologies provide substation protection
Steve Lasky is the Editorial Director of Southcomm Security Media, which includes print publications SD&I, Security Technology Executive and Locksmith Ledger International – as well as the world’s top security web portal, SecurityInfoWatch.com. He is a 30-year veteran of the security industry and a 26-year member of ASIS. Contact him at slasky@southcomm.com.
Dealers, Integrators & Installing Companies

Remembering Two Heroes

Dec. 15, 2017
Back in mid-October, I had the pleasure to help host the first CONSULT17 event in San Antonio along with its founder Ray Coulombe, a leading security voice in our industry and...
Protecting the power grid has emerged as a federal government priority.
Video Surveillance

Protecting the Power Grid

Dec. 15, 2017
A look at NERC CIP-014 using video surveillance

More content from Nov-Dec 2017

Image Courtesy of BigStock.com
Firewalls alone are increasingly insufficient as the enterprise has expanded to include things like bring your own device (BYOD), Internet of Things (IoT) devices, and increased demand for mobile equipment connectivity.
Physical Hardening

8 Lessons Learned on Perimeter Security for all Healthcare Executives

Overconfidence in your plan and an underestimated threat can spell disaster
Thermal cameras are essential for 24/7 threat recognition for nuclear plants and play a key role in the overall physical security plan.
Video Surveillance

Nuclear Power Plants Turn Up the Security Heat

Dec. 15, 2017
Harsh environment spurs use of thermal video technology on site
Scott Stewart is vice president of tactical analysis for Stratfor Threat Lens, a product that helps security leaders identify, anticipate, measure and mitigate risks that emerging threats pose to their people, assets and interests around the globe.
Robotics

5 Threat Trends for the Coming Year

Dec. 15, 2017
From terrorism to cyber intrusions, potential threats are many
Write to Ray about this column at ConvergenceQA@go-rbcs.com. Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Ray is an active contributor to the educational activities ASIS IT Security and Physical Security councils. For more information about Ray and RBCS go to www.go-rbcs.com or call 949-831-6788. Ray is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS
Dealers, Integrators & Installing Companies

Technology Lifecycle Management

Q: Our IT department is upgrading their technology lifecycle management and they want to include our networked security systems in their program. How do we do that?A: Your IT ...
Liz Maida is the CEO and co-founder of Uplevel Security, a provider of an adaptive system of intelligence to detect, analyze and resolve cybersecurity threats. Previously, Liz was with Akamai Technologies, serving in multiple executive roles focused on technology strategy and new product development, including DDoS mitigation, fraud detection and more.
Security Executives

4 reasons to rethink incident response playbooks

Dec. 15, 2017
Hackers love the static nature of concrete policy
bigstock All signs point to words like 36693244 5a8c6cce44c6d
Information Security

Disruptive, you say?

Dec. 15, 2017
I was standing on a street corner in Santiago, Chile. I looked at my watch and realized I would be late to meet my wife for dinner after she finished work if I continued walking...
Udi Segall is the Director of Business Development at Qognify.
Monitoring Station Consoles

Fake news can clutter your control room

Dec. 15, 2017
False alarms limit an operator’s overall efficiency
BigBook Winter2017 5a33f453cc94a
Video Surveillance

Big Book: Winter 2017

Dec. 15, 2017
The Security Industry's Product Guide
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Cybersecurity

Tech Trends: Hacking the Lights Out

Nov. 13, 2017
What integrators can learn from recent worldwide power grid cyberattacks