Archives

Smart city and global network concept.

The Increasing Importance of Security Integration

One of the best parts about gearing up for the Total Security Summit happening June 25-26 in Plano, Texas has been engaging with event speakers. The breadth and depth of their knowledge has opened the doors to some truly interesting conversations. I recently chatted with Terry Gold, the founder and principal analyst at D6 Research […]

School classroom

Attack-Resistant Doors and Hardware Could Help Slow or Deter Attackers

Thinking about school safety requires more prescience than ever before, as the first 6 months of 2018 have proven. While some of the more public discussions have focused on the controversial political issues of gun control and arming teachers, there are other, more immediate stop-gap measures to employ in the interim. One move school districts […]

Broken Padlock

Crowdfunded Security Solutions Might Not Live Up to Hype

Crowdfunding sites like Kickstarter and IndieGoGo have made serious inroads over the last few years, allowing entrepreneurs and established companies alike to pitch products directly to consumers. I have crowdfunded a couple of projects (nothing security related), and thankfully, I have yet to get burned—either by someone who can’t or won’t deliver a product or […]

Keeping Security Officers in ‘Professional Mode’ at Your Facility

Security officers can and should play many roles during their guard shifts, including providing information; good customer service to employees, vendors, and visitors; and remaining vigilant, especially when they have not encountered past crime or violence problems on the site. It’s important that they not get distracted from their security duties by employees or supervisors […]

3D rendering Central Computer Processors CPU concept. Electronic engineer of computer technology. Computer board chip circuit cpu core. Hardware concept electronic device motherboard semiconductor

Non-Malware Attacks: What They Are and How to Protect Against Them?

Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]

active shooter

Active Shooter Training for Your Workforce

An active shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearms, and there is no pattern or method to their selection of victims.

Software Patch

How Microsoft Determines Which Bugs it Will Patch

Ever since the Spectre and Meltdown vulnerabilities were made public in January 2018, it seems like there’s been a more critical eye tracking Microsoft’s patch releases. These updates are typically pushed on the second Tuesday of every month, consisting of fixes for vulnerabilities discovered over the previous 30 days. That is, unless there’s a serious […]

Workplace security

Are All of Your Employees Trained in Workplace Security?

It’s all too easy for many employees to consider workplace security as someone else’s job. They often assume the responsibility lies with management, security staff, surveillance cameras, the IT department, or the police. That can be true to an extent, but for security to really be effective, everyone at the company must be involved.