The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
The topic was cryptography with Nathan Cummings, director of integration/application for HID Connect, talking this past Tuesday on the impact of new cryptography requirements on next generation physical access
Brand protection and corporate reputations as well as increased regulations are pressuring organizations, especially banks, educational institutions and healthcare firms, to get tougher on securing databases. Often it takes
President Barak Obama, just days ago, announced $3.4 billion in grants to update the nation’s electrical grid aimed at creating a more efficient and reliable electric system in the
Department of Homeland Security (DHS) Secretary Janet Napolitano announced yesterday (Oct. 29) the transfer of the Federal Protective Service (FPS) from U.S. Immigration and Customs Enforcement (ICE) to the
Some say it was an ominous sign when some Bobbies’ helmetcams literally caught fire. The darling of proponents of security on city streets, Great Britain’s police agencies, borough councils
As government and enterprise security work together or apart to prioritize the protection of critical infrastructure, there’s the chance on not spending as much time and resources on soft
Secure communications expert Simon Ford, director of NCP engineering, points out that “most corporations realize the vulnerability of PCs and laptops and have implemented various security protocols to prevent
Security Magazine’s January 2010 has two major features that would gain from your Blogged input. Securing the Global Enterprise -- There are common and unique needs for chief security
It could be how the C-suite folks look at their IT operation, but it turns out that many enterprises have over-bought and are under using servers. A new study
In interviews for an upcoming Security Magazine article on hybrid security video (coming in the December 2009 print issue), a couple of somewhat alien terms arose – cloud computing