This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Network security practitioners often look to solve technical problems with technical solutions: “The engineers got us into this mess; they can get us out of it.”
An often overlooked risk for CSOs is the security technology management process. Security technologies present risks to the enterprise that must be managed.
Much has changed in visitor management procedures and policies since the days of entering a visitor’s name in the log book and slapping on a sticky badge with a handwritten name on it. Often, visitors were not even asked for identification, and there was no way to track or confirm if or when they left the building.
I believe we are at an inflection point in our industry. The transactions of value within our ecosystem of consultants, integrators, product vendors and security executives must evolve to meet the new business and risk reality.
From smart cities to stadiums, from retail mega-markets to homes, video surveillance has become a pervasive phenomenon. Several petabytes of video data are being generated globally every year from this growing number of video surveillance installations.