Sept-October 2020

Retail and COVID-19
Courtesy of Getty Images -- Credit:pixinoo
When it comes to facial recognition, it’s no surprise that the first application many people think of is loss prevention.
When it comes to facial recognition, it’s no surprise that the first application many people think of is loss prevention.
When it comes to facial recognition, it’s no surprise that the first application many people think of is loss prevention.
When it comes to facial recognition, it’s no surprise that the first application many people think of is loss prevention.
When it comes to facial recognition, it’s no surprise that the first application many people think of is loss prevention.
Facial Recognition Solutions

Facial Recognition Goes Beyond Simple Loss Prevention

Sept. 11, 2020
Thanks to advanced analytics, this technology is not just about catching the bad guys
Courtesy of Getty Images -- Credit:metamorworks
Video is the original sensor on the Internet of Things (IoT) and brings added value to an organization’s security strategy by allowing extensive connectivity along with the intelligence it provides.
Video is the original sensor on the Internet of Things (IoT) and brings added value to an organization’s security strategy by allowing extensive connectivity along with the intelligence it provides.
Video is the original sensor on the Internet of Things (IoT) and brings added value to an organization’s security strategy by allowing extensive connectivity along with the intelligence it provides.
Video is the original sensor on the Internet of Things (IoT) and brings added value to an organization’s security strategy by allowing extensive connectivity along with the intelligence it provides.
Video is the original sensor on the Internet of Things (IoT) and brings added value to an organization’s security strategy by allowing extensive connectivity along with the intelligence it provides.
Video Surveillance

How to Implement a Data-rich Video Surveillance Strategy

Sept. 11, 2020
Central to a data-rich surveillance strategy is understanding the needs of the customer
Lasky Gsx1
Lasky Gsx1
Lasky Gsx1
Lasky Gsx1
Lasky Gsx1
Breach Detection

Ransomware Spreads a New Virus

Sept. 11, 2020
The recent attack on Tesla open a dangerous threat vector
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
Cybersecurity

Entering the Profession

Sept. 11, 2020
While some claim a shortage of cybersecurity applicants, others wonder where all the jobs are
Courtesy of Getty Images -- Kat-Ka
Getty Images 1223315034 (1)
Getty Images 1223315034 (1)
Getty Images 1223315034 (1)
Getty Images 1223315034 (1)
Getty Images 1223315034 (1)
COVID-19

COVID-19 Contact Tracing and Personnel Privacy Rights

Typically, regarding physical security systems and programs, there are significant gaps in the management of what is today considered personally identifiable data (PII). This ...

More content from Sept-October 2020

Courtesy of Getty Images -- Credit: Margarita-Young
Anarchists driving some of this activity have little regard for personal safety and obviously none at all for property. Frequently, their goal is to damage or destroy what businesses have worked hard to create.
Anarchists driving some of this activity have little regard for personal safety and obviously none at all for property. Frequently, their goal is to damage or destroy what businesses have worked hard to create.
Anarchists driving some of this activity have little regard for personal safety and obviously none at all for property. Frequently, their goal is to damage or destroy what businesses have worked hard to create.
Anarchists driving some of this activity have little regard for personal safety and obviously none at all for property. Frequently, their goal is to damage or destroy what businesses have worked hard to create.
Anarchists driving some of this activity have little regard for personal safety and obviously none at all for property. Frequently, their goal is to damage or destroy what businesses have worked hard to create.
Retail

Top 5 Challenges and Threats to Retail Risks

Sept. 11, 2020
The continuing pandemic and economic rollercoaster are formidable issues for loss prevention professionals
Pierre Bourgeix, MS, MA, MBA, CPP is currently the CTO and Founder of ESI Convergent, LLC. Pierre has spent 30 years as a global security consultant and innovator through his experience with The Rand Corporation, The U.S. State Department, ADT/Tyco Security, HySecurity, Wallace International, SecureState and Boon Edam.
Pierre Bourgeix, MS, MA, MBA, CPP is currently the CTO and Founder of ESI Convergent, LLC. Pierre has spent 30 years as a global security consultant and innovator through his experience with The Rand Corporation, The U.S. State Department, ADT/Tyco Security, HySecurity, Wallace International, SecureState and Boon Edam.
Pierre Bourgeix, MS, MA, MBA, CPP is currently the CTO and Founder of ESI Convergent, LLC. Pierre has spent 30 years as a global security consultant and innovator through his experience with The Rand Corporation, The U.S. State Department, ADT/Tyco Security, HySecurity, Wallace International, SecureState and Boon Edam.
Pierre Bourgeix, MS, MA, MBA, CPP is currently the CTO and Founder of ESI Convergent, LLC. Pierre has spent 30 years as a global security consultant and innovator through his experience with The Rand Corporation, The U.S. State Department, ADT/Tyco Security, HySecurity, Wallace International, SecureState and Boon Edam.
Pierre Bourgeix, MS, MA, MBA, CPP is currently the CTO and Founder of ESI Convergent, LLC. Pierre has spent 30 years as a global security consultant and innovator through his experience with The Rand Corporation, The U.S. State Department, ADT/Tyco Security, HySecurity, Wallace International, SecureState and Boon Edam.
Information Security

Keeping Secrets in an Era of Quantum Computing

Sept. 11, 2020
The benefits this new era of computing will usher in also comes with some unwanted security side effects
Courtesy of Getty Images -- Credit: Drazen Zigic
2020 was already poised to be a year of elevated social unrest in the United States due to the fact that it is an election year and the environment of partisanship has led to numerous protest actions - often resulting in violence.
2020 was already poised to be a year of elevated social unrest in the United States due to the fact that it is an election year and the environment of partisanship has led to numerous protest actions - often resulting in violence.
2020 was already poised to be a year of elevated social unrest in the United States due to the fact that it is an election year and the environment of partisanship has led to numerous protest actions - often resulting in violence.
2020 was already poised to be a year of elevated social unrest in the United States due to the fact that it is an election year and the environment of partisanship has led to numerous protest actions - often resulting in violence.
2020 was already poised to be a year of elevated social unrest in the United States due to the fact that it is an election year and the environment of partisanship has led to numerous protest actions - often resulting in violence.
Security Executives

How Political and Social Unrest Affect Global Security in the Age of Covid-19

Sept. 11, 2020
The pandemic is already showing signs of amplifying ongoing turmoil around the world
Courtesy of Getty Images -- Credit:mixetto
As the process of reopening unfolds, property and facility managers will have to update policies and procedures continually and proactively in their buildings.
As the process of reopening unfolds, property and facility managers will have to update policies and procedures continually and proactively in their buildings.
As the process of reopening unfolds, property and facility managers will have to update policies and procedures continually and proactively in their buildings.
As the process of reopening unfolds, property and facility managers will have to update policies and procedures continually and proactively in their buildings.
As the process of reopening unfolds, property and facility managers will have to update policies and procedures continually and proactively in their buildings.
Security Industry Services

How Buildings Can Help People Get Back to Work

Sept. 11, 2020
BOMA Canada works with security solutions providers to expedite business reopening
Courtesy of Master Lock
Access management remains a work in progress for corporate and industrial facilities everywhere.
Access management remains a work in progress for corporate and industrial facilities everywhere.
Access management remains a work in progress for corporate and industrial facilities everywhere.
Access management remains a work in progress for corporate and industrial facilities everywhere.
Access management remains a work in progress for corporate and industrial facilities everywhere.
Access Control

Best Practices for Plugging Access Control Gaps

Sept. 11, 2020
Every facility is unique in its challenges for mitigating risk and securing staff and assets
Courtesy of Getty Images -- Credit: FG Trade
Today’s cutting-edge visitor management systems incorporate COVID-critical features such as facial recognition (for contact tracing), mask detection, health questionnaires, and temperature checks.
Today’s cutting-edge visitor management systems incorporate COVID-critical features such as facial recognition (for contact tracing), mask detection, health questionnaires, and temperature checks.
Today’s cutting-edge visitor management systems incorporate COVID-critical features such as facial recognition (for contact tracing), mask detection, health questionnaires, and temperature checks.
Today’s cutting-edge visitor management systems incorporate COVID-critical features such as facial recognition (for contact tracing), mask detection, health questionnaires, and temperature checks.
Today’s cutting-edge visitor management systems incorporate COVID-critical features such as facial recognition (for contact tracing), mask detection, health questionnaires, and temperature checks.
Access & Identity

Visitor Management Systems in the Age of Covid-19

Knowing who is entering your facility is more than just a security issue in today’s pandemic
Brian Coulombe is Principal and Director of Operations at DVS, a division of Ross & Baruzzini. Contact him at bcoulombe@rossbar.com, through Linked in at www.linkedin.com/in/brian-coulombe, or on Twitter @DVS_RB.
Brian Coulombe is Principal and Director of Operations at DVS, a division of Ross & Baruzzini. Contact him at bcoulombe@rossbar.com, through Linked in at www.linkedin.com/in/brian-coulombe, or on Twitter @DVS_RB.
Brian Coulombe is Principal and Director of Operations at DVS, a division of Ross & Baruzzini. Contact him at bcoulombe@rossbar.com, through Linked in at www.linkedin.com/in/brian-coulombe, or on Twitter @DVS_RB.
Brian Coulombe is Principal and Director of Operations at DVS, a division of Ross & Baruzzini. Contact him at bcoulombe@rossbar.com, through Linked in at www.linkedin.com/in/brian-coulombe, or on Twitter @DVS_RB.
Brian Coulombe is Principal and Director of Operations at DVS, a division of Ross & Baruzzini. Contact him at bcoulombe@rossbar.com, through Linked in at www.linkedin.com/in/brian-coulombe, or on Twitter @DVS_RB.
Access Control

Tech Trends: Turn Over a New LEAF

Sept. 11, 2020
Standards platform enables access control interoperability for cards, readers and key control
Courtesy of Getty Images --GoodLifeStudio
Threats to retail markets include skyrocketing theft and a growing organized retail crime factor.
Threats to retail markets include skyrocketing theft and a growing organized retail crime factor.
Threats to retail markets include skyrocketing theft and a growing organized retail crime factor.
Threats to retail markets include skyrocketing theft and a growing organized retail crime factor.
Threats to retail markets include skyrocketing theft and a growing organized retail crime factor.
Retail

A COVID-19 tsunami of crime threatens to overwhelm retailers

Aug. 14, 2020
As economic and social woes increase, the retail sector is faced with unprecedented criminal risk