MAY-JUNE 2023

Corporate Business Risk Mitigation/Security

More content from MAY-JUNE 2023

David Henderson, the Director of Industrial Segment for Micron Technology’s Embedded Business Unit.
This embedded product portfolio and ecosystem focus solutions optimized for complex memory and storage demands at the intelligent edge
June 20, 2023
DoorKing’s ProxPlus Secure card reader system is based on the 13.56 MHz MIFARE standard.
ProxPlus Secure cards are programmed with a unique identifier, making them extremely secure and difficult to duplicate
June 20, 2023
Allegion is a global pioneer in seamless access, with leading brands like CISA®, Interflex®, LCN®, Schlage®, SimonsVoss® and Von Duprin®. Focusing on security around the door and adjacent areas, Allegion secures people and assets with a range of solutions for homes, businesses, schools and institutions.
Custom encryption keys and credential technology play a key role in empowering end users
June 20, 2023
Courtesy of BigStock.com -- Copyright: ismagilov
Effective and efficient visitor management sets an expectation that an organization is serious about its security program.
Mitigating an organization’s risk depends on knowing who is in the facility and for what purpose
June 20, 2023
Courtesy of Getty Images -- Credit: Zinkevych
Full-height turnstiles are ideal for this first layer of defense.
Physical security entrances are the first line of defense in protecting precious data
June 20, 2023
Courtesy of Getty Images - Credit: Andrii Yalanskyi
Getty Images 1073073584
Consistent communication is key when engaging with business executives about mitigating threats
June 20, 2023
Courtesy of Getty Images
ML can benefit physical security teams by helping to identify anomalies or suspicious behavior.
Empowering security professionals to employ advanced technology can only enhance situational awareness
June 20, 2023
Courtesy of Getty Images -- Credit:/PlargueDoctor/
Part of the challenge of securing MLOps is the sheer length and depth of typical machine learning pipelines.
Larger and more sophisticated businesses will lean into building out their in-house data science teams and capabilities
June 20, 2023
Courtesy of Getty Images -- Credit: gorodenkoff
Getty Images 1175197224
CSO strategies in meeting today’s global threat environment need to be multi-faceted
June 20, 2023
Bigstock 147774710
Outsourcing a SOC allows organizations to gain the security they need while creating a predictable budget line
June 20, 2023
Courtesy of Getty Images
Getty Images 1051617224
Q: So many of the same things are being said about AI and physical security system products – how do I make sense of it all?A: Evaluating AI-enabled physical security products...
June 20, 2023
Courtesy of BigStock.com -- Copyright: Drozd Irina
Bigstock Legacy Text Written On Notepad 448686310
What do you want your legacy to be? We have all wrestled with this question at one time or another in our lives.For some, the answer is easy. "I want to be known as the best lawyer...
June 20, 2023
Bigstock Top Secret Rubber Stamp Seal 475658629
I am may not the right person to opine on the cybersecurity Culture of Secrecy. My career was launched by a stint as a military member of the National Security Agency. I had been...
June 20, 2023
Courtesy of BigStock.com -- Copyright: SkazovD
Physical security teams are often viewed as cumbersome, slow-moving and highly reactive cost centers.
Don’t be surprised by what can be accomplished when a CSO & CISO join forces to fight insider threats
June 19, 2023
GSO is designed for a small group – limited to 50 people – to allow for in-depth discussions and explorations of important topics to a much deeper level in ways very specific to the attendees.
Ray Bernard discusses the GSO summit’s unique perspectives that go beyond typical security industry events.
May 11, 2023