May-June 2019

More content from May-June 2019

Olsen 1 Camera Fov
Plan your project carefully and understand the mission of the camera array
June 17, 2019
Image Courtesy of BigStock.com
The advancement of open architecture access control systems and the growth of OSDP-compliant devices is enhancing security.
Many EAC manufacturers have updated their devices and adopted the OSDP protocol
June 17, 2019
Image Courtesy of BigStock.com
When thinking about a user’s security experience in general and in access control specifically, security managers seldom seriously ask themselves what users are confronted with when they use an access control system.
Striking a proper balance of convenience with advanced technology ensures systems that users will embrace
June 17, 2019
Image Courtesy of BigStock.com
Candidly, given today’s reliance on information to operate any type of business, is there even really a difference between a CSO and CISO?
That decision will ultimately depend on who possesses better business acumen and risk sensitivity
June 17, 2019
Timothy Winters is a Senior Executive, Software and IP Networking, at the University of New Hampshire InterOperability Laboratory (UNH-IOL).
Network security and performance are important aspects of design that are closely related. When designing a network, the security is a critical portion. Modern network security...
June 17, 2019
Ray Bernard, PSP CHS-III, is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities (www.go-rbcs.com). In 2018 IFSEC Global listed Ray as #12 in the world’s Top 30 Security Thought Leaders. He is the author of the Elsevier book Security Technology Convergence Insights available on Amazon. Mr. Bernard is a Subject Matter Expert Faculty of the Security Executive Council (SEC) and an active member of the ASIS International member councils for Physical Security and IT Security. Follow Ray on Twitter: @RayBernardRBCS.
This question has a variety of prompters such as equipment purchase requests, annual maintenance and service budget approvals, security incidents, and unresolved investigations...
June 17, 2019
John Mc Cumber Headshot 2 Mb 5c75619da5bd7
A huge phenomenon in our industry was the emergence of the hacker conference. Just over a decade ago, small groups of self-identified hackers and vulnerability researchers pioneered...
June 17, 2019
Bigbook 1 24 Spring2019 1
The Security Industry's Product Guide
May 16, 2019