Four types of security entrance for solutions that truly fulfill security goals

Read Greg Schreiber four types of security entrance solutions for access management on Source Security : Security and systems integrators across the nation are recommending and providing long-term security solutions to their customers. But when it comes to physical security entrances, integrators can easily fall into the trap of simply fulfilling an end user’s exact request […]

Five things you need to know about executive protection

Read list five things that companies need to know about CEO, CISO, CSO protection on CSO Online : Protecting executives today is about much more than physically shielding them from danger. The cyber security risks are higher than ever, and organizations need to ensure that the network and data access many high-level executives have doesn’t […]

Security reality check: The real threat is closer to home

Organizations and governments often underestimate insider threats and the damage they can do. Read the full article here. Cognitio’s Take: One of the biggest organizational risks to mitigate are trusted individuals with authorized access to, or knowledge of, sensitive data or business operations. These individuals can potentially wittingly or unwittingly damage your business. Mitigating this risk is further complicated […]

Securing Asia’s data centers against physical threats

While no one will refute the importance of physical security within data centers, server racks in data centers here are typically secured using physical keys that are easily duplicated. And, compounding that problem, is the use of a common key to secure large swathes of racks, CK Cheong, CEO of ERS Group, told DCD. Read […]

Facebook Security Boss: Empathy, Inclusion Must Come to Security

Twenty years of Black Hat seemed to be the appropriate marker in time for Alex Stamos to remind security professionals of their unique position to affect change, not only in technology and business, but also in geopolitics and human rights. Read why Alex Stamos of Facebook says that empathy and inclusion should be the key […]

Tackling the cyber security conundrum

Read Marcus Hand’s article about how the merchant navy sector can tackle the cyber security issues facing them on Sea Trade Maritime : A standard bearer for digitalisation in shipping Maersk responded quickly but the company still needed a month to get its systems back fully functioning, highlighting not just the vulnerability of companies in […]

Shoring up security in enterprise AV

Kieran Walsh, senior technical solutions manager at Audinate outlines the top vulnerabilities in today’s enterprise AV systems. The top vulnerabilities in an AV system are very similar in a lot of ways to any other system (IT or otherwise). A general concept of security is “Access, Authentication and Auditing.”+ Read Kieran Walsh of Audinate explain the top […]

5 Reasons to Invest in a Security System for Your Business

Read Dan Scalco list five reasons that every company should invest in a security system on Huffington Post : When it comes to the physical security of their company, many business owners take the approach of sticking their head in the sand. Read his full article here.

Physical Security Is Critical For Protecting Your Data

Read why Anthony Caruana says that physical security is critical for protecting data on Life Hacker : While many people focus on the logical security around their data, physical security gets a lot less attention. Locking down the electronic components of physical security is an area that’s forgotten once it’s installed. Tony Vizza, from IT […]

7 Layers of Security Each Business Owner Should Consider

Read Elena Prokopets list seven layers of security every business should consider implementing on Business 2 Community : In 2015, the IRS, the State Department, and the White House were all hacked. How vulnerable are you? You might think not so much because, after all, you are not a “big boy,” and hackers have “bigger […]