Security Magazine

June 2014

View Archived Issues

2014 June

In the June issue of Security Magazine, read about how you can build a better brand for your enterprise, as well as how to control brand risk that goes with a product. Discover the 9 strategies you can use to protect your privacy from cyber space. Also, find out how to protect yourself from wearable technology- like smartwatches and Google Glass. Catch up on the latest news as well as the latest technology and products in the security industry.

Building Security's Brand for Better Buy-in

In a wired world that is also full of risk, an enterprise’s reputation can be destroyed in hours.
By Diane Ritchey
No Comments

We share threat information throughout all areas of the organization, we coordinate response events, mitigating controls and we also report to our executive staff and regulatory group on incidents and events. My organization was formed to reduce reputational, financial, operational, and compliance related risks.”


Read More

Monitoring Operations from a Distance for Safer Operations

What are other ways that you can communicate use cases and savings to get buy-in from other departments?
By Claire Meyer
No Comments

Using cameras can provide a viable alternative, when combined with analytics, to bypass other infrastructure-heavy tools, such as adding fiberoptic cable to perimeter fencing to detect intruders or trenching for driveway sensors or barricades, giving Taminco and the security system an overall smaller footprint.


Read More

Future-Proofing with Smart Card Investments

The buzz around the Vanderbilt University Medical Center was that proximity cards were the next step in hospital security and data protection
By Claire Meyer
No Comments

While the system is indeed better protecting patient information, enabling students to access dormitories and laundry rooms, and even presents the possibility of connecting with point of sale systems across both the university and hospital campuses, one measurable impact of swapping technologies is the reduction in maintenance. 


Read More

Protecting SMB Investments with Electronic Access Control

Keys can be copied, codes can be shared, and investments can be lost
By Claire Meyer
No Comments

With programmable automatic locking from RS2 and local integrator Kendell Doors, however, Shanks can program the building’s doors to lock and unlock during various community or extracurricular events on the campus.


Read More

9 Strategies to Protect Privacy in Cyber Space

Privacy issues have long been a big concern when it comes to cybersecurity, but with major security breaches like the one Target experienced in December 2013
By Sarah Ludwig
No Comments

In the event of a breach, you need to have a written plan to take immediate steps and know who is going to analyze the problem, who will notify the people impacted by the breach, and who you can call for help, among other things.


Read More

How to Make Unreliable Video Reliable

At any given time, 30 percent of an IP video network does not work properly.
By Diane Ritchey
One Comment

Viakoo detects and alerts customers to anything that threatens, degrades or stops a video stream from the camera across the network to the recording disks; every 20- minutes. It also points to the probable cause and what corrective action should be taken


Read More

Adopting Wireless Video to Tackle Covert Surveillance Operations

Crime and vandalism are down with wireless video.
By Diane Ritchey
No Comments

The results have been amazing: over the course of six months, more than 100 arrests have been made for outstanding warrants, gun violations, underage drinking, drug possession and robbery. Crime and vandalism are down; hikers and bikers feel safe again visiting the area.


Read More

How to Plan for Emergency Response Success

Just because a natural, man-made or other type of disaster has never happened within your enterprise doesn’t mean it never will
By Claire Meyer
No Comments

The Indiana University System is currently undergoing FEMA’s Disaster Resistant University process, which helps higher education institutions identify specific campus risks, develop a risk assessment and build a platform for an all-hazards preparedness program.


Read More

Planning for a Safe and Secure 2014 World Cup

High-profile litigation has broadened the scope and understanding of the duty of care that companies owe to their employees traveling abroad.
No Comments

The World Cup Games offer a unique opportunity for companies throughout the world – a month-long celebration of the world’s most popular sport in a region where it enjoys widespread support.


Read More

Protecting Data Against Wearable Technology Risks

Many tech giants have recently made a big push in wearable items.
No Comments

An organization has to look at the whole picture when thinking about the risks and acceptable use policy regarding wearable technology.


Read More

Using Security Convergence to Enable the Enterprise

Enterprises realize tremendous benefits from this convergence as well as some serious downsides, but the trend is irreversible.
By Robert Liscouski
No Comments

The concept of remote decision making, while necessary in 2000, is not necessary today. Let’s use the significant security and power of existing IT networks, let it all be managed by IT and let security get back to their primary job, deciding who should get in and responding to those who should not.


Read More

Lessons Learned from Security 500 Palo Alto

How little opex can you spend and still get the job done
No Comments

Perhaps the most valuable learning from this panel was that there is not and may never be a “one size fits all” solution for our industry. While there are many economic and operational advantages to a single provider, there are also some risks associated with this model.


Read More

Facing an Uncertain Future in Cybersecurity Enforcement

The FTC has become the nation’s leading force to drive and enforce consumer privacy
By Steven Chabinsky
No Comments

In early May, the FTC’s Chief Administrative Law Judge held that in an enforcement action the FTC must disclose “what data security standards, if any” it has published and intends to rely upon to demonstrate that a company’s data security practices are not reasonable and appropriate.


Read More

Controlling Brand Risk

How the market perceives a company and its brand(s) ultimately dictates success or failure.
By Jerry Brennan and Lynn Mattice
No Comments

Constant vigilance in the marketplace is vital to understanding, responding to and mitigating incidents that can have a devastating impact on your enterprise’s brand and reputation.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+