At the New Year we find ourselves reflecting on who we are as an industry, what we’re doing and where we hope to be. Our ongoing research of security-related issues has shed light on some remarkable changes in the security industry in the last ten years, many of which are driven by technology advances and shifts in the business environment.
How would you like to develop a security operation that can be benchmarked and based on reliable standards reduces liability, improves professionalism and makes a positive impression on the C suite. Wouldn’t it be nice if a blueprint for such an organization existed?
There is a dirty bomb music video. There are at least three dirty bomb movies.
But, when it comes to reality, such weapons are fairly easy to assemble and activate.
Some of the most challenging needs facing decision makers in today’s networked surveillance come after the initial deployment. After the selection and installation of hardware, software and camera providers, many begin to realize the benefits of the new system. This involves utilizing the new technologies within a framework of existing training policies, with the objective of exploiting the greatest capabilities of the system.
When I was growing up in New Jersey, if someone hit you in the nose and took your lunch money, well, you didn’t eat lunch that day. In the cyber world the punches are bigger, the dollars are tremendous and you don’t eat lunch because once your intellectual and physical property is gone, so are the jobs and paychecks that IP created.
It often appears that everyone in the industry is talking about how to lower the costs of networked surveillance cameras compared to that of the analog security video type. What doesn’t seem to get as much attention is the fact that the really expensive cameras are growing as fast as is the low-end camera market.
Get to know Shelley Stewart, Executive Director, Global Security for Cummins, Inc. The company is a Fortune 500 corporation that designs, manufactures, sells and services diesel engines, power generation systems and related products and technologies.
Afghanistan, Syria, North Korea, Yemen, Somalia.
Remember that Barry McGuire 1965 song, “Eve of Destruction?” “The eastern world, it is exploding / Violence flarin', bullets loadin' / You don't believe in war, but what's that gun you're totin'?”
Big Data Is…. Big! It also poses big risks and big opportunities.
As you know, there has been a lot written lately about cloud computing, and due to the platform’s design, cloud computing security. Securing the cloud is the work of technical experts at places like Google, Amazon, NSA and the DOD. And that cloud is being secured more each minute through both better procurement policy and technology.
Meet Miki Calero, CSO for the city of Columbus, Ohio. As the city’s top security executive, he establishes and leads the enterprise security risk management program for the 15th largest city in the nation. Calero is also one of Securitymagazine’s 2012 Most Influential Security Executives, featured in this issue.