Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Surveillance Strategies

Robert Liscouski is CEO and co-founder of Axio Global LLC and the former Assistant Secretary for Infrastructure Protection for DHS, appointed by President George W. Bush.

ARTICLES

Integrating Security Systems for Greater Business Value

 Security countermeasures, such as surveillance, address threats and if done effectively eliminate them; this is more likely the case when an integrated solution is deployed.  In looking at integrated security solutions, there exists an opportunity to move beyond a view of providing countermeasures to threats toward a new perspective of security as a means of delivering critical business value. 


Read More

Leveraging Surveillance Technologies for Safer Cities

Most U.S. cities are currently experiencing historic lows in crime rates.

Safe City initiatives typically start with the integration of security video. In most cases the cameras are operated by the police department or other local government entities such as Departments of Transportation, or Emergency Operations Centers.


Read More

In Defense of Post-9/11 Surveillance

The disclosures by Edward Snowden over the past year have raised the public’s awareness about the U.S. Government’s surveillance tactics and capabilities to defend our nation against another 9/11 magnitude attack.

Surveillance was performed by putting people on the street and watching from parked cars and vans disguised at Bell Telephone service vehicles with portholes cut out for still cameras.


Read More

Using Security Convergence to Enable the Enterprise

Enterprises realize tremendous benefits from this convergence as well as some serious downsides, but the trend is irreversible.

The concept of remote decision making, while necessary in 2000, is not necessary today. Let’s use the significant security and power of existing IT networks, let it all be managed by IT and let security get back to their primary job, deciding who should get in and responding to those who should not.


Read More

Making Surveillance a Business Intelligence Necessity

There are two types of successful CSOs today: those that have cross-purposed their investment in video surveillance, and those that will.

In business, anomalies (events that differ from the norm) should get your attention. From a loss prevention perspective, one of the most effective ways to counter theft and fraud is to identify and track POS transactions that differ from the norm.


Read More

Measuring the Role of Risk Transfer in Cybersecurity Management

Recent events have catapulted cyber threats from a compartmentalized CISO responsibility to a boardroom discussion about director liability.

An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?


Read More

Changing the Definition of Surveillance in the Age of Converged Risk

Surveillance deals with the act of carefully watching someone or something with the specific intent to prevent or detect a crime.

The role of the CSO has significantly changed in the past 10 years and will change even more drastically over the next 10. For example, mention “convergence” and lines begin to blur – lines demarcating previously clear-cut, albeit traditional areas of management responsibility, budgets, reporting hierarchies, resourcing needs and geography.


Read More

How Remote Monitoring Can Combine Services and Surveillance

The size of the global security guarding and monitoring services industries in 2014 is projected to be more than $85 billion

The size of the global security guarding and monitoring services industries in 2014 is projected to be more than $85 billion and has historically been growing at an annual rate of between four and seven percent per year.


Read More

Comparing Surveillance Options for SMBs, Enterprises

During the past 20 years, product technology within the analog security video industry had been very stable, with only minor product advances.

In the analog security video boom, end users’ surveillance needs were very similar, regardless of their company’s size, but today’s surveillance product technologies are rapidly changing this historical norm. The needs of small and midsized businesses (SMBs) are moving in the opposite direction of enterprises, where the surveillance needs are getting more closely aligned with the enterprise’s IT requirements.


Read More

Studying the Pros and Cons of Proprietary Wireless Surveillance

There are many examples within the technology industry of proprietary being considered better than standards-based systems.

There are many examples within the technology industry of proprietary being considered better than standards-based systems. This certainly is the case within the Wireless Mesh Network (WMN) industry. These providers tend to be small and niche-based network manufacturers servicing specific industries.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+