Corporations, universities and other institutions have faced the question of whether to outsource or not to outsource for decades when it comes to physical security and more recently on the cybersecurity side. What is the correct answer to this question?
As you advance your security career into senior and executive levels, occasions may arise where your personal values may conflict with those in the organization. How will you handle ethical challenges that may have career and life-long impacts?
Recent California wildfires have challenged enterprise security professionals who are responsible for protecting and managing emergency evacuations. How can enterprise security professionals leverage their existing security hardware and software investments to better prepare for emergencies?
While access cards still play a strong role in the access control market, some companies are moving toward smartphone Bluetooth-enabled technology to give residents frictionless access through secured doors, elevators and turnstiles.
The Internet of Things (IoT) is living up to the hype. There are more than 20 billion end devices already networked through the Internet, with this number increasing more than three times by the year. In the process, end devices are becoming increasingly more intelligent and efficient, fueled by progress being made in artificial intelligence (AI), machine learning and even 5G, the new mobile phone technology, which creates the required bandwidths for data transfer in the IoT.
When it comes to cloud solutions, there are many questions regarding the migration process. To help with the transition, end users need to have a full understanding of what cloud is and what they would be getting. The security industry is conservative and can be slow to make changes, however it’s not a question of ‘if’ you might transfer to cloud, but ‘when.’
Though data breaches are a serious issue for large enterprise organizations, especially from a reputation perspective, the threat of compromise is a top concern for most small and midsized businesses (SMBs), too.
There is a healthy fear within the cybersecurity community that hackers can exploit security vulnerabilities in medical devices with relative ease, thereby endangering patients and putting a healthcare organization’s data assets at serious risk.
This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.