• Home >
  • Back Issues >
  • Security Executive >
  • Feb-March 2018
  • Feb-March 2018

    More content from Feb-March 2018

    Image Courtesy of BigStock.com
    Because of the risk and security intricacies involved in a large merger or acquisition, the CSO and senior security team must assume multiple leading roles: consultant, mentor, facilitator and arbitrator.
    CSOs Scott Soltis and Dan Colin share their keys to success when it comes to creating a cohesive security plan among newly integrated companies
    March 13, 2018
    (Image courtesy bigstockphoto.com/Rawpixel.com)
    The myriad security challenges presented by today's threat landscape requires corporate boards to be proactive in putting together a comprehensive risk mitigation strategy that protects their organization on multiple fronts.
    It has been a tradition at Security Technology Executive magazine over the last 28 years to rely on trusted advisors to help steer the editorial direction of the publication, ...
    March 13, 2018
    Mc Cumber John 10531637 jpg
    I have been blessed in my long career in what is now known as cybersecurity. When I started in 1988, it was called CompuSec by the Department of Defense who needed a way to distinguish...
    March 13, 2018
    Image Courtesy of BigStock.com
    In most cases, active shooters use firearms and there is no pattern or method to their selection of victims.
    No employer can afford to treat the risk of a violent workplace attack lightly
    March 13, 2018
    Image Courtesy of BigStock.com
    The challenge to the end user is two-fold, not only how to structure a viable storage solution, but how to address the larger challenge of managing the growing volume of unstructured data.
    A multi-tier approach is a great way to get the capacity you need at a lower cost
    March 13, 2018
    Image Courtesy of BigStock.com
    A robust protective intelligence program, when combined with an educated and alert workforce provide a solid foundation upon which security managers can build a proactive security program that keeps them all left of the boom.
    Security professionals must create an inclusive culture of awareness and preparedness to meet organizational threats
    March 13, 2018
    violenceste4 5aa6962a65464
    Workplace violence is a traumatic event that is occurring with increasing frequency
    March 13, 2018
    Image Courtesy of BigStock.com
    Due to the sensitive nature of healthcare information, the cyber threat will always be a prioritized concern for all healthcare security executives.
    Security executives will need to rethink their approach to mitigating risk in tomorrow’s threat landscape
    March 13, 2018
    Write to Ray about this column at ConvergenceQA@go-rbcs.com. Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Ray is an active contributor to the educational activities ASIS IT Security and Physical Security councils. In 2018 IFSEC Global listed Ray as #12 in the world’s top 20 Security Thought Leaders. For more information about Ray and RBCS go to www.go-rbcs.com or call 949-831-6788. Ray is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS.
    I constantly receive this same question at security conferences, and I hear them in discussions whenever the subject of camera management is raised by people who are responsible...
    March 13, 2018
    (Image courtesy bigstockphoto.com)
    Public-sector problems with ransomware have been at a low simmer for a while, with 35 state and local governments reporting problems in 2014, according to the Multi-State Information Sharing and Analysis Center, an organization that tracks cybersecurity issues for states and localities. But in 2015, the FBI warned that the problem is on the rise -- growing 114 percent in 2014 -- and said that unlocking the files is so difficult that the agency often suggests just paying the ransom.
    Studying the history of ransomware will help organizations better prepare for an attack
    March 13, 2018
    (Photo courtesy bigstockphoto.com/sudok1)
    Despite the fact that many healthcare institutions have implemented the latest operating systems of their main user devices and services in the network, many fail to ensure that medical devices have the most up-to-date operating system and/or they fail to change the default settings that come with these devices. These minor maintenance lapses leave the door wide open for attackers to exploit these existing vulnerabilities and security gaps.
    Cybersecurity teams at hospitals have a lot on their plates. Not only do they have to worry about the traditional cybersecurity challenge of maintaining an enterprise network ...
    March 13, 2018
    Sielox logo 5a96d8f80732a
    Enhances value proposition and cost efficiency for integration partners
    Feb. 28, 2018
    (Image courtesy Johnson Controls)
    The American Dynamics victor Video Management System and VideoEdge Network Video Recorders (NVRs) from Johnson Controls offers operators more robust unification between access control and video information and smart video streaming for bandwidth management for improved operator and system productivity.
    Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
    A closer look at the a few of the hot gunshot detection products on the market
    Feb. 13, 2018
    (Image courtesy Hanwha Techwin America)
    Hanwha Techwin America's Wisenet WAVE is a new VMS (Video Management System) designed to support the advanced features, and onboard video analytics that are unique to Hanwha cameras.
    (Image courtesy Johnson Controls)
    The C•CURE Go Install app provides a more efficient, convenient means of configuring or updating information on the iSTAR Ultra LT controller without having to physically access the unit.
    (Image courtesy bigstockphoto.com/tombaky)
    SecurityInfoWatch.com recently convened a panel of industry experts to get their thoughts on the current state of access control and where the market is headed in 2018 and beyond.
    Industry experts share their predictions for the year ahead in this exclusive SIW roundtable
    Jan. 5, 2018
    (Photo courtesy FLIR Systems)
    FLIR Systems' new FB-Series ID thermal fixed bullet camera.
    Quantum Xcellis Facing Straight PRINT 5a9444dfeb80b
    ISC West 2018 Booth #22125
    April 18, 2017
    Ca4 K Mobile App
    Amityville, NY – Continental Access announced the new release of CA4K v1.0 of its new Enterprise Access Control & Security Management Platform, integrating access control, wireless...
    March 1, 2017