Learn how to change the game of security with better statistics
November 5, 2013
Leveraging metrics and statistics can lead to a stronger security program, just as they led to a better baseball team for the Oakland Athletics in “Moneyball.” So how can these metrics protect your enterprise from a Risk-Nado?
Two weeks ago, ASIS International Seminar and Exhibits arrived in Chicago, bringing plenty of flash in its opening ceremonies, as well as plenty of possible security solutions on the show floor, as manufacturers seek to help enterprise security leaders get more from their existing investments in analog systems.
Got a question for a leading integrator? Submit it in the comments!
August 1, 2013
Integrators are a key partner in many enterprises’ security programs, but they also have the unique viewpoint across the industry, foreseeing the next trends from manufacturers while understanding the demands and needs of integrators.
Integrators are a key partner in many enterprises’ security programs, but they also have the unique viewpoint across the industry, foreseeing the next trends from manufacturers while understanding the demands and needs of integrators.
In my previous article on PSIM ROI, I explained how organizations can use PSIM to achieve operational savings. In this second installment of my two-part series on PSIM ROI, I’ll explore a less obvious (hidden) PSIM ROI which can be achieved through better security.
Really, Security 500 Members, when we add up all of the leadership, subject matter expertise and business acumen you bring to your enterprises, what happens? Absolutely Nothing. Well, it is my turn, with the publication of the Security 500, to say to each of the 500 who have been ranked on this year’s prestigious list: “Thanks for Nothing.”
Security officer titles and perceptions, workplace violence incidents and alphabet soup top the list of this week's most popular articles at SecurityMagazine.com.
When I was growing up in New Jersey, if someone hit you in the nose and took your lunch money, well, you didn’t eat lunch that day. In the cyber world the punches are bigger, the dollars are tremendous and you don’t eat lunch because once your intellectual and physical property is gone, so are the jobs and paychecks that IP created.
Over the coming years the surveillance industry will follow a similar path that the IT industry has tread increasingly more service offerings. These offerings will range from live remote monitoring to managed surveillance systems, with both private and public cloud deployments.