Hewlett-Packard's third annual State of Security Operations Report 2016 found that security operations center maturity remains well below optimal levels, with 85 percent of assessed organizations falling below recommended maturity levels.
Commercial and retail end users will drive the growth of remote monitoring services in intelligent buildings, accounting for more than 80 percent of the $400 million market in 2016, according to IMS Research, now part of IHS Inc.
Not exactly Maxwell Smart’s Cone of Silence, there was a time when security staff members monitoring blurry CCTV video images on CRTs would look through a kind of cone device to cut down on monitor glare.
Monitoring makes a difference. Surveillance is not a monitored Video Intrusion Alarm. Security video and DVRs (whether on-site or the newer DVRs in the cloud) provide remote viewing and document what has happened – but their primary use isn’t catching burglars.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!