Picture this – in 20 minutes, one enterprising hacker at the 2012 Defcon conference in Las Vegas learned one Wal-Mart store’s physical logistics – from the janitorial contractor to where employees go to lunch – key details about the make and version numbers of the Wal-Mart manager’s PC, browser and anti-virus software, and got the manager to upload the address of an external website into his browser – no questions asked.
When the LA Kings won the Stanley Cup last year in their hometown of Los Angeles and home ice rink, STAPLES Center, Lee Zeidman and David Born celebrated with them. Both men were not only proud that the LA Kings brought home a championship, but they celebrated the fact that during the series, the team, their families, fans and employees were safe and the facility was secure.
In the past year, highly publicized mass shootings — especially the Sandy Hook Elementary School tragedy in December — have made the call for armed security officers commonplace. To many, it seems logical to fight fire with fire; that is, using armed officers to combat armed criminals and prevent tragedies from occurring.
Welcome to the adventures of complete facility access control solutions. Enterprise security leaders and integrators face diverse mysteries here, but each can be solved with an intelligent mixture of technology, security focus and IT collaboration, seasoned with a big dose of bottom-line business benefits.
The video analytics drums are beating louder these days. But now may finally be the time when technology advances, security-and-beyond enterprise-centric applications, IT’s big data notion and smarter systems integration are trending to real, cost-effective benefits.
Conducting investigations within a security organization is very different than an episode of Miami Vice– from the timeframe to the interviews to, probably, the color of the investigator’s blazer. The process isn’t as thrilling as TV makes it out to be, but, as ACFE President and CEO James Ratley knows, that perception can work in your favor
Businesses today face an ever growing array of threats to the security of their critical data and IT assets. From sophisticated cyber attacks to unintentional data exposure to environmental threats, the list of potential causes of harm is endless.
Her name was Sandy, and after a brief visit, the lights were out, thousands homes and businesses were damaged or destroyed and emergency planning programs were put to the test.
First of all, it is better to hard-wire security video, especially when it comes to megapixel cameras. But there are times, locations and missions where wireless makes the best sense.