• Home >
  • Back Issues >
  • Security Executive >
  • Sept-October 2022
  • Sept-October 2022

    Critical Infrastructure & Drones

    More content from Sept-October 2022

    Courtesy of Getty Images -- Credit:Maria Stavreva
    In this increasingly volatile security environment, what’s needed is an integrated approach to manage “tail risk” contingencies.
    A flexible threat-informed security strategy is key to maintaining business operations prior to threat events
    Sept. 9, 2022
    Courtesy of Getty Images -- Credit:gorodenkoff
    Modern logistics organizations require a holistic view of their security landscape.
    Modern logistics organizations require a holistic view of their security landscape
    Sept. 9, 2022
    Courtesy of Getty Images
    Today's best-in-class biometric identity solutions use digitized, encrypted signatures of unique physical characteristics like facial architecture, iris patterns, palm vein patterns, or fingerprint whorls.
    Commercial properties should consider beginning with biometrics in an access control strategy
    Sept. 9, 2022
    Courtesy of Getty Images -- Credit:FangXiaNuo
    Experts are divided on whether it benefits the security department to connect directly to the top.
    Just as biometrics shouldn’t be forced onto access control and convergence of physical and cyber isn’t for every organization, senior security executives do not necessarily need...
    Sept. 9, 2022
    Courtesy of Getty Images -- Credit: Martin Barraud
    Tailgating is one of the biggest physical security risks that security operations teams face. In a recent survey, 48% of respondents said that they had experienced a tailgating violation.
    Organizations can mitigate the issue by pairing technology with their security policy
    Sept. 9, 2022
    Courtesy of BigStock.com -- Copyright: Andrii Koval
    Bigstock The Phrase Stay Out Of The U 387887107
    As the U.S. midterm elections approach, experts expect possible Russian interference
    Sept. 9, 2022
    Guidance documents are available online, and it can be helpful to find door naming convention documents for building types and facilities similar to your own.
    Naming doors is not usually a simple task for multi-building sites or multi-site security systems
    Sept. 9, 2022
    Courtesy of BigStock.com -- Copyright: eamesBot
    Bigstock Public Speaking Skill Confide 411101239
    Mike Howard's special column in Security Technology Executive
    Sept. 9, 2022
    Courtesy of BigStock.com -- Copyright: eamesBot
    Bigstock Self Esteem Or Self Care Beli 415954660
    John McCumber's monthly view on security
    Sept. 9, 2022
    Courtesy of BigStock.com -- Copyright: Photonphoto
    Most organizations have no way to centrally track and manage their non-employee relationships and the access to enterprise assets their roles require.
    An executive Q&A with Jennifer Kraxner, the Vice President of Market Strategy at SecZetta
    Sept. 9, 2022
    M4 Family Primary
    A secure and feature-rich key system is designed to protect against physical attack - GSX 2022 Booth 2443
    Aug. 16, 2022
    Ix Dvm Entrance Woman
    Mullion Mount IP Video Door Station Helps to Reduce Germs at Entrances
    Aug. 16, 2022
    Axis P1467 Le Wall Angle Right 2112 En Us 360058
    See them at GSX 2022 Booth 3343
    Aug. 16, 2022
    Door Detective Plus 2
    Solution improves access control at doorways by protecting the door once it’s unlocked - see it at GSX 2022 Booth 4143
    Aug. 15, 2022
    I Pro Multi Sensor Camera Feb 2022 Scaled
    See them at GSX 2022 Booth 3633
    Aug. 15, 2022