Sept-October 2023

Critical Infrastructure
Courtesy of -- Copyright: ismagilov
It's important to note that implementing a large-scale biometric deployment requires expertise in biometric technology, security and project management.

Biometrics From Theory to Reality

Nov. 28, 2023
Making large-scale biometric deployment for access control work
Courtesy of
Ensure physical security measures and technologies are in place to prevent unauthorized access to sensitive areas and equipment.
Security Executives

Why Critical Infrastructure Is The New Target

Sept. 27, 2023
Many companies seek outside cybersecurity consultants to help enhance their internal teams’ knowledge and abilities
Courtesy of -- Copyright: P.sim
Today there are numerous initiatives to create a single pane of glass to use and manage integrated physical security solutions.
Access & Identity

How to Protect Network-Centric Physical Security Systems

The migration to a single-pane-of-glass approach limits risk but does not eliminate security threats
Courtesy of -- Copyright: Macrovector SLU
AI-powered access control systems can learn and adapt to changing threats, making them much more difficult to breach while providing a heightened level of protection...
Access & Identity

AI Advanced Analytics That Bring Value to Access Control Systems

Aug. 30, 2023
As advanced technology options expand, the industry understands there are issues to be addressed
Steve Lasky, Editorial Director
Security Executives

Don’t Ask, Don’t Tell

Aug. 30, 2023
For almost two decades the United States military abided by the mantra of “don’t ask, don’t tell,” referring to its official policy on non-heterosexual service people. The policy...

More content from Sept-October 2023

Courtesy of Getty Images -- Credit:gorodenkoff
Critical Infrastructure use video surveillance and advanced analytics as a security baseline for most applications.
Video Surveillance

Critical Infrastructure Video Technology a Vital Security Tool

Aug. 30, 2023
Security executives of critical infrastructure facilities should become familiar with industry guidance documents
Courtesy of Getty Images -- Credit:Laurence Dutton
Security elements, unless a priority of the owner as a prerequisite for an acceptable design, are fighting to be heard in an ever-growing list of design requirements.
Security Industry Services

From Building Design to Technology Application

Aug. 30, 2023
Crossing the threshold of the future of converged building design
Courtesy of Suprema
Using biometrics in private schools eliminates the need for physical credentials.
Access & Identity

Biometrics Implementation in a Private School: A Case Study

Aug. 30, 2023
How to enhance security, operational efficiency with biometric access control
Superintendent Jeremy Gulley serves on the PASS Board of Directors and Advisory Council.
Video Intercoms

Campus Safety

Aug. 30, 2023
Mass communication is a critical tool for K-12 schools when it comes to safety and security.During a crisis, intercom systems can help to communicate critical messages to staff...
Courtesy of
Bigstock Artificial Intelligence And Ma 339983059
Security Executives

How am I doing, Boss?

Aug. 30, 2023
It’s performance appraisal time. Lucky you. It’s that dreaded event where your HR department proudly manages your input to and progress through the process. Now, if you decided...
Courtesy of
Bigstock Bald Mature Director Of Softwa 440759810
Security Executives

The Buck Stops Here for Real Leaders

Aug. 30, 2023
President Harry Truman uttered the now-famous phrase “The Buck Stops Here.” Truman was a man who stood by those words come hell or high water. He represented the truest form of...
Courtesy of -- Copyright: Freshpixel
The growth in threat vectors and protective needs have created the two security universes of physical security and cyber/information security.
Security Executives

Strategies for Protecting Critical Infrastructure

Aug. 6, 2023
Risk management calculations are still a useful tool to apply a formula for measuring risk and threat probabilities from high to low
Courtesy of -- Copyright: AlexLMX
These vintage industrial controls, which cannot be upgraded and are located in facilities too vast to be secured, result in a toxic combination.
Critical Infrastructure

The state of energy and utilities cybersecurity posture

July 26, 2023
Older systems are vulnerable unless critical infrastructure budgets reflect a growing threat
(Image courtesy
Both converged and hyper-converged infrastructure provide a pre-configured package of software and hardware in a single system for simplified management. But with converged infrastructure, the compute, storage, and networking components are discrete and can be separated. With hyper-converged infrastructure, the pre-configured package is a single product provided by a single vendor. The way it scales up is by up by connecting more pre-configured packages together, whose infrastructure management software keeps it all looking like a single package to its users.
Security Executives

Real words or buzzwords?: Hyper-Converged Infrastructure

HCI has been a hot phrase in IT for several years, but do its promises hold true for the physical security industry?