A new national survey from the Center for Data Innovation finds that just one in four Americans (26 percent) want government to strictly limit the technology, and that support drops to fewer than one in five (18 percent) if it would come at the cost of public safety.
Applying security technology to business continuity and operational efficiency was a major theme for 2018, and will be especially important in 2019. As technology is an integral part of business operations - and with cybersecurity risks at an all-time high - many organizations are utilizing their security platforms beyond traditional applications to improve operations and increase efficiency.
The advent of electronic access control and identity management has made it easier and more convenient for organizations to deploy security solutions at the entry of facilities. But, has it actually made the facilities more secure?
When the prestigious Aloft Dubai South in the United Arab Emirates opened on October 15, 2018, guests, visitors and staff at the new hotel were already protected by an advanced video surveillance system with Arecont Vision Costar megapixel cameras.
Criminal cyber activity evolves at an incredible pace. Today’s cybercriminals are constantly on the lookout for security gaps that will give them access to your facilities or a wide range of important, private and sensitive information. In our increasingly interconnected world, the potential avenues of exploitation seem greater than ever.
By definition, a perimeter is the outer boundary, and securing that perimeter means protecting that area. Everything has a perimeter, from a large university campus to your own personal space on that campus. Law enforcement and security personnel have predefined outer perimeters that keep people either in or out in the case of an event. But you should also look within the perimeter to criticalities that could present problems.
Security directors are no stranger to the necessity of blending legacy physical security devices and software with newer products and services. Whether you are a retail business in search of higher resolution camera technology for more accurate images, or you’re the head of a multi-location organization that wants to leverage new access control card reader technology with existing hardware without installing completely new door controllers, card readers and wiring, retrofits are a large percentage of installations, encompassing many of our industry’s technologies.
The cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI).