Feb-March 2018

More content from Feb-March 2018

Image Courtesy of BigStock.com
Because of the risk and security intricacies involved in a large merger or acquisition, the CSO and senior security team must assume multiple leading roles: consultant, mentor, facilitator and arbitrator.
Access Control

Five Steps to a Risk-Free M&A

March 13, 2018
CSOs Scott Soltis and Dan Colin share their keys to success when it comes to creating a cohesive security plan among newly integrated companies
(Image courtesy bigstockphoto.com/Rawpixel.com)
The myriad security challenges presented by today's threat landscape requires corporate boards to be proactive in putting together a comprehensive risk mitigation strategy that protects their organization on multiple fronts.
Associations, Research & Training Organizations

My Point of View: Meet the Board

March 13, 2018
It has been a tradition at Security Technology Executive magazine over the last 28 years to rely on trusted advisors to help steer the editorial direction of the publication, ...
Mc Cumber John 10531637 jpg
Information Security

What is Wrong with This Job, Anyway?

March 13, 2018
I have been blessed in my long career in what is now known as cybersecurity. When I started in 1988, it was called CompuSec by the Department of Defense who needed a way to distinguish...
Image Courtesy of BigStock.com
In most cases, active shooters use firearms and there is no pattern or method to their selection of victims.
Training Companies and Organizations

How to Handle an Active Shooter Situation

March 13, 2018
No employer can afford to treat the risk of a violent workplace attack lightly
Image Courtesy of BigStock.com
The challenge to the end user is two-fold, not only how to structure a viable storage solution, but how to address the larger challenge of managing the growing volume of unstructured data.
Video Surveillance

How to Bring Bottom Line Control to Video Surveillance Storage

March 13, 2018
A multi-tier approach is a great way to get the capacity you need at a lower cost
Image Courtesy of BigStock.com
A robust protective intelligence program, when combined with an educated and alert workforce provide a solid foundation upon which security managers can build a proactive security program that keeps them all left of the boom.
Security Executives

Proactive Security Programs Help You Stay Left of the Boom

March 13, 2018
Security professionals must create an inclusive culture of awareness and preparedness to meet organizational threats
violenceste4 5aa6962a65464
Access Control

Strategies to Mitigate Healthcare Workplace Violence Threats

Workplace violence is a traumatic event that is occurring with increasing frequency
Image Courtesy of BigStock.com
Due to the sensitive nature of healthcare information, the cyber threat will always be a prioritized concern for all healthcare security executives.
Access Control

Emerging Threats in Healthcare and the Adaptation of Protection Models

March 13, 2018
Security executives will need to rethink their approach to mitigating risk in tomorrow’s threat landscape
Write to Ray about this column at ConvergenceQA@go-rbcs.com. Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Ray is an active contributor to the educational activities ASIS IT Security and Physical Security councils. In 2018 IFSEC Global listed Ray as #12 in the world’s top 20 Security Thought Leaders. For more information about Ray and RBCS go to www.go-rbcs.com or call 949-831-6788. Ray is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS.
Video Surveillance

How to Manage High-Camera-Count Deployments

I constantly receive this same question at security conferences, and I hear them in discussions whenever the subject of camera management is raised by people who are responsible...
(Image courtesy bigstockphoto.com)
Public-sector problems with ransomware have been at a low simmer for a while, with 35 state and local governments reporting problems in 2014, according to the Multi-State Information Sharing and Analysis Center, an organization that tracks cybersecurity issues for states and localities. But in 2015, the FBI warned that the problem is on the rise -- growing 114 percent in 2014 -- and said that unlocking the files is so difficult that the agency often suggests just paying the ransom.
Computer and Network Security Software

The Growing Ransomware Threat and Trends

Studying the history of ransomware will help organizations better prepare for an attack
(Photo courtesy bigstockphoto.com/sudok1)
Despite the fact that many healthcare institutions have implemented the latest operating systems of their main user devices and services in the network, many fail to ensure that medical devices have the most up-to-date operating system and/or they fail to change the default settings that come with these devices. These minor maintenance lapses leave the door wide open for attackers to exploit these existing vulnerabilities and security gaps.
Computer and Network Security Software

Top 6 Challenges in Tackling Cybersecurity of Medical Devices in Hospitals

March 13, 2018
Cybersecurity teams at hospitals have a lot on their plates. Not only do they have to worry about the traditional cybersecurity challenge of maintaining an enterprise network ...
Sielox logo 5a96d8f80732a
Access Control

Sielox now includes Altronix access and power solution

Feb. 28, 2018
Enhances value proposition and cost efficiency for integration partners
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Alarm Systems & Intrusion Detection

Tech Trends: Hearing is Believing

Feb. 13, 2018
A closer look at the a few of the hot gunshot detection products on the market
(Image courtesy Hanwha Techwin America)
Hanwha Techwin America's Wisenet WAVE is a new VMS (Video Management System) designed to support the advanced features, and onboard video analytics that are unique to Hanwha cameras.
(Image courtesy bigstockphoto.com/tombaky)
SecurityInfoWatch.com recently convened a panel of industry experts to get their thoughts on the current state of access control and where the market is headed in 2018 and beyond.
Access & Identity

Access control evolution spotlights high-tech and cybersecurity advancement in 2018

Jan. 5, 2018
Industry experts share their predictions for the year ahead in this exclusive SIW roundtable
(Photo courtesy FLIR Systems)
FLIR Systems' new FB-Series ID thermal fixed bullet camera.
Ca4 K Mobile App
Access Control Software & Management Systems

Continental Access CA4K v1.0 Enterprise Security Management Software

Amityville, NY – Continental Access announced the new release of CA4K v1.0 of its new Enterprise Access Control & Security Management Platform, integrating access control, wireless...