May-June 2018

Image Courtesy of BigStock.com
Automated solutions help to dramatically reduce the costs involved in maintaining and operating security systems.
Access Control

Automated System Verification Can Be a Proactive Systems Approach

June 15, 2018
Today’s complex enterprise networks mandate sophisticated checks and balances
Image Courtesy of BigStock.com
For corporate businesses, information protection is critical and the risks and threats keep changing.
Information Security

Economic Espionage and the Growing Case for Corporate Counterintelligence

June 15, 2018
Expanding profiles of ‘actors’ points to new global risk in information protection, cybersecurity
Image Courtesy of BigStock.com
In today’s environment of reduced visibility, the actions of all supply chain actors, reduced controls and today’s “lean” practices do not bode well for future loss containment.
Access Control

Steps to Secure and Mitigate Risk for the Global Supply Chain

June 15, 2018
A protective supply chain security policy should be one of a company’s core directives
Image Courtesy of BigStock.com
Building an effective world-class manned protection force for the industrial sector requires industry knowledge, continual planning and training and oversight.
Protective Operations & Guard Services

How to Build a World-Class Manned Protection Force

June 15, 2018
Organizations that thrive empower their security teams to be competitive, resilient and inspired
Image Courtesy of BigStock.com
By combining up to four individual sensors – or camera heads – into a single housing, multi-sensor cameras can replace multiple cameras, and the ability to deliver high-quality 180° or 360° panoramic views of a scene.
Video Surveillance

3 Ways Multi-Sensor Cameras Alter the Video Surveillance Landscape

June 15, 2018
Users are seeing the advantages of multi-use options and cost-savings with these cameras

More content from May-June 2018

Image Courtesy of BigStock.com
While every organization should judge the risks and rewards of its own data protection investments, the GDPR offers a unique opportunity to translate necessary compliance actions into tangible business benefit.
Information Security

It’s Official: GDPR Has Arrived

June 15, 2018
As some companies scrambled to meet compliance requirements, others refined their roadmap
Image Courtesy of BigStock.com
PIAM software ties everything together so that organizations can know that employees are who they claim to be as they move through multiple facilities and access their services.
Steve Laskynew 10536785 jpg
Information Security

Alexa, Where’s My Privacy?

June 15, 2018
I’m one of those baby-boomer technology aficionados who consider himself a minimalist when it comes to personal tech gadgets. Don’t do the do the whiz-bang digital watches that...
Write to Ray about this column at ConvergenceQA@go-rbcs.com. Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Ray is an active contributor to the educational activities ASIS IT Security and Physical Security councils. In 2018 IFSEC Global listed Ray as #12 in the world’s top 20 Security Thought Leaders. For more information about Ray and RBCS go to www.go-rbcs.com or call 949-831-6788. Ray is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS.
Turnstiles

Effective Anti-Tailgating Technologies

Tailgating – the practice of an unauthorized individual gaining building or area access by following behind an authorized individual – is a decades-old security problem.Q: We’...
Mc Cumber John 10531637 jpg
Information Security

Cool as McCumber: Can I interest you in buying my cybersecurity insights?

June 15, 2018
Back about eighteen years ago, a popular cybersecurity group started a website that contained a list of industry charlatans, plagiarizers, and sundry technology scammers. Our ...
As counsel at Foley Hoag in Boston, Christopher Hart’s practice centers on three areas: civil commercial and business litigation, data privacy and cybersecurity, and representation of foreign sovereigns in U.S. courts and international tribunals. As an experienced litigator, Chris has represented Fortune 500 companies, start-up companies, individuals, and sovereign nations in a wide variety of contexts for over a decade.
Information Security

After Your Data Breach

June 15, 2018
How to defend against private litigation in State and Federal Court
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
IP Network Surveillance Cameras

Tech Trends: A$$1Gn1ng $afe Cam3r@ Pa$$w0rd$

June 13, 2018
A look at technological advances to solve the problem of weak IP camera passwords