Sept-October 2022

Critical Infrastructure & Drones
Courtesy of Getty Images -- Credit: Planet Flem
Global threats have domestic implications for Homeland Security as the weaponization of commercial drones is now common in conflicts around the world.
Global threats have domestic implications for Homeland Security as the weaponization of commercial drones is now common in conflicts around the world.
Global threats have domestic implications for Homeland Security as the weaponization of commercial drones is now common in conflicts around the world.
Global threats have domestic implications for Homeland Security as the weaponization of commercial drones is now common in conflicts around the world.
Global threats have domestic implications for Homeland Security as the weaponization of commercial drones is now common in conflicts around the world.
Anti-Drone Technologies

Weaponization of Commercial Drones is a Global Threat

Sept. 26, 2022
Drone battlefield lessons translate into domestic security preparedness requirements (STE magazine cover story Sept. 2022)
Courtesy of Smarter Security Inc.
If a weapon detection system detects a gun, Fastlane with SmarterLobby can lock the lane even if the person is authorized.
If a weapon detection system detects a gun, Fastlane with SmarterLobby can lock the lane even if the person is authorized.
If a weapon detection system detects a gun, Fastlane with SmarterLobby can lock the lane even if the person is authorized.
If a weapon detection system detects a gun, Fastlane with SmarterLobby can lock the lane even if the person is authorized.
If a weapon detection system detects a gun, Fastlane with SmarterLobby can lock the lane even if the person is authorized.
Sponsored

Tailgating Has Evolved Into a Top Security Priority

Sept. 9, 2022
Organizations can no longer treat this issue as a nuisance and ignore its risk implications (sponsored by Smarter Security)

More content from Sept-October 2022

Courtesy of Getty Images -- Credit:Maria Stavreva
In this increasingly volatile security environment, what’s needed is an integrated approach to manage “tail risk” contingencies.
In this increasingly volatile security environment, what’s needed is an integrated approach to manage “tail risk” contingencies.
In this increasingly volatile security environment, what’s needed is an integrated approach to manage “tail risk” contingencies.
In this increasingly volatile security environment, what’s needed is an integrated approach to manage “tail risk” contingencies.
In this increasingly volatile security environment, what’s needed is an integrated approach to manage “tail risk” contingencies.
Security Executives

How to Build Resiliency in Times of “Tail Risk” Events

Sept. 9, 2022
A flexible threat-informed security strategy is key to maintaining business operations prior to threat events
Courtesy of Getty Images -- Credit:gorodenkoff
Modern logistics organizations require a holistic view of their security landscape.
Modern logistics organizations require a holistic view of their security landscape.
Modern logistics organizations require a holistic view of their security landscape.
Modern logistics organizations require a holistic view of their security landscape.
Modern logistics organizations require a holistic view of their security landscape.
Physical Hardening

Top Four Security Trends for Logistics Facilities

Sept. 9, 2022
Modern logistics organizations require a holistic view of their security landscape
Courtesy of Getty Images
Today's best-in-class biometric identity solutions use digitized, encrypted signatures of unique physical characteristics like facial architecture, iris patterns, palm vein patterns, or fingerprint whorls.
Today's best-in-class biometric identity solutions use digitized, encrypted signatures of unique physical characteristics like facial architecture, iris patterns, palm vein patterns, or fingerprint whorls.
Today's best-in-class biometric identity solutions use digitized, encrypted signatures of unique physical characteristics like facial architecture, iris patterns, palm vein patterns, or fingerprint whorls.
Today's best-in-class biometric identity solutions use digitized, encrypted signatures of unique physical characteristics like facial architecture, iris patterns, palm vein patterns, or fingerprint whorls.
Today's best-in-class biometric identity solutions use digitized, encrypted signatures of unique physical characteristics like facial architecture, iris patterns, palm vein patterns, or fingerprint whorls.
Biometrics

Using Biometrics to Protect Mission Critical Infrastructure

Sept. 9, 2022
Commercial properties should consider beginning with biometrics in an access control strategy
Courtesy of Getty Images -- Credit:FangXiaNuo
Experts are divided on whether it benefits the security department to connect directly to the top.
Experts are divided on whether it benefits the security department to connect directly to the top.
Experts are divided on whether it benefits the security department to connect directly to the top.
Experts are divided on whether it benefits the security department to connect directly to the top.
Experts are divided on whether it benefits the security department to connect directly to the top.
Security Executives

Security executives take varied paths to a relationship with the C Suite

Just as biometrics shouldn’t be forced onto access control and convergence of physical and cyber isn’t for every organization, senior security executives do not necessarily need...
Courtesy of Getty Images -- Credit: Martin Barraud
Tailgating is one of the biggest physical security risks that security operations teams face. In a recent survey, 48% of respondents said that they had experienced a tailgating violation.
Tailgating is one of the biggest physical security risks that security operations teams face. In a recent survey, 48% of respondents said that they had experienced a tailgating violation.
Tailgating is one of the biggest physical security risks that security operations teams face. In a recent survey, 48% of respondents said that they had experienced a tailgating violation.
Tailgating is one of the biggest physical security risks that security operations teams face. In a recent survey, 48% of respondents said that they had experienced a tailgating violation.
Tailgating is one of the biggest physical security risks that security operations teams face. In a recent survey, 48% of respondents said that they had experienced a tailgating violation.
Access Control

Close the Door on Tailgating

Sept. 9, 2022
Organizations can mitigate the issue by pairing technology with their security policy
Courtesy of BigStock.com -- Copyright: Andrii Koval
Bigstock The Phrase Stay Out Of The U 387887107
Bigstock The Phrase Stay Out Of The U 387887107
Bigstock The Phrase Stay Out Of The U 387887107
Bigstock The Phrase Stay Out Of The U 387887107
Bigstock The Phrase Stay Out Of The U 387887107
Breach Detection

Is There a Russian Election Security Risk in 2022?

Sept. 9, 2022
As the U.S. midterm elections approach, experts expect possible Russian interference
Guidance documents are available online, and it can be helpful to find door naming convention documents for building types and facilities similar to your own.
Guidance documents are available online, and it can be helpful to find door naming convention documents for building types and facilities similar to your own.
Guidance documents are available online, and it can be helpful to find door naming convention documents for building types and facilities similar to your own.
Guidance documents are available online, and it can be helpful to find door naming convention documents for building types and facilities similar to your own.
Guidance documents are available online, and it can be helpful to find door naming convention documents for building types and facilities similar to your own.
Access Control

The Door Naming Challenge – Part 2

Naming doors is not usually a simple task for multi-building sites or multi-site security systems
Courtesy of BigStock.com -- Copyright: eamesBot
Bigstock Public Speaking Skill Confide 411101239
Bigstock Public Speaking Skill Confide 411101239
Bigstock Public Speaking Skill Confide 411101239
Bigstock Public Speaking Skill Confide 411101239
Bigstock Public Speaking Skill Confide 411101239
Security Executives

The Art of Public Speaking

Sept. 9, 2022
Mike Howard's special column in Security Technology Executive
Courtesy of BigStock.com -- Copyright: eamesBot
Bigstock Self Esteem Or Self Care Beli 415954660
Bigstock Self Esteem Or Self Care Beli 415954660
Bigstock Self Esteem Or Self Care Beli 415954660
Bigstock Self Esteem Or Self Care Beli 415954660
Bigstock Self Esteem Or Self Care Beli 415954660
Cybersecurity

For Now, We See in a Mirror, But Dimly

Sept. 9, 2022
John McCumber's monthly view on security
Courtesy of BigStock.com -- Copyright: Photonphoto
Most organizations have no way to centrally track and manage their non-employee relationships and the access to enterprise assets their roles require.
Most organizations have no way to centrally track and manage their non-employee relationships and the access to enterprise assets their roles require.
Most organizations have no way to centrally track and manage their non-employee relationships and the access to enterprise assets their roles require.
Most organizations have no way to centrally track and manage their non-employee relationships and the access to enterprise assets their roles require.
Most organizations have no way to centrally track and manage their non-employee relationships and the access to enterprise assets their roles require.
Cybersecurity

Why Proactive Cybersecurity is a Business Essential

Sept. 9, 2022
An executive Q&A with Jennifer Kraxner, the Vice President of Market Strategy at SecZetta
M4 Family Primary
M4 Family Primary
M4 Family Primary
M4 Family Primary
M4 Family Primary
Locks

Medeco 4 (M4) Cylinders

A secure and feature-rich key system is designed to protect against physical attack - GSX 2022 Booth 2443
Ix Dvm Entrance Woman
Ix Dvm Entrance Woman
Ix Dvm Entrance Woman
Ix Dvm Entrance Woman
Ix Dvm Entrance Woman
Video Intercoms

Aiphone IX-DVM intercom

Mullion Mount IP Video Door Station Helps to Reduce Germs at Entrances
Door Detective Plus 2
Door Detective Plus 2
Door Detective Plus 2
Door Detective Plus 2
Door Detective Plus 2
Alarm Systems & Intrusion Detection

Smarter Security's Door Detective Plus

Solution improves access control at doorways by protecting the door once it’s unlocked - see it at GSX 2022 Booth 4143