Real words or buzzwords?: IP-based, IP-enabled or IP-capable?

About 15 years ago, many physical security industry companies began jumping on the “IP Bandwagon.” Before long, there were three terms that appeared in materials and discussions about security industry products and systems: IP-based, IP-capable and IP-enabled. Read the difference between IP-based, IP-enabled or IP-capable cyber security and whether they are relevant now on Security Info […]

How Google’s Physical Keys Will Protect Your Password

Read Brian X. Chen and Nicole Perlroth explain how Google’s new physical keys will help you protect your password on NY Times : Why won’t the password just go away? The silly pet names, movie titles or sports teams that many people punch in to get into their online accounts are a weak spot that […]

Colocation Should Be Part of Your Disaster Recovery Plan

Read Chris Schwarz’s article about why colocation should be a part of any organization’s disaster recovery plan on Techspective : Catastrophic failures are, by definition, unpredictable. It is, however, safe to predict that at some point in the life of a company, it will suffer a failure of its primary infrastructure. Read his full article here.

Google now offers special security program for high-risk users

Today, Google rolled out a new program called Advanced Protection for personal Google accounts, intended to provide much higher account security to users of services like Gmail and Drive who are at a high risk of being targeted by phishers, hackers, and others seeking their personal data. Read about the new Advanced Protection for personal Google […]

NIST leadership tackling physical security weaknesses through culture change, employee training

The National Institute of Standards and Technology boasts a history of bright minds contributing to everything from atomic clocks to the study of outer space fires, but while the institute is known for its research in safety and industry settings, the physical security of its facilities is falling short. Read how National Institute of Standards and Technology (NIST) is tackling physical […]

Gmail to rollout physical security option for executive users

Google will soon launch upgraded security options for better protection, according to a recent report. The company is boosting the email protections used to keep sensitive data safe. The changes target executives and politicians and include physical keys. Read about Google’s latest initiative to provide physical security option for executive users in Gmail on Digital […]

The Next Key To Online Security Could Be A Physical One

Read why Casey Mendoza  and James Packard says that the next key to online security could be physical security on News5Cleveland : Let’s face it: Your online passwords are likely very hackable. But instead of making them more secure, the key to protecting online accounts from hackers might be a physical one. Read his full […]

Myth busted: Physical security is not separate from cybersecurity

Read  Jessica Davis’ article about why physical security is not separate from cyber security on Healthcare IT News : Physical security, which includes safeguarding medical devices, machines and paper documents, is often discussed as an element separate from cybersecurity. But while it would be nice for these functions to be separate, at the end of […]

Big Data Applications For Physical Security

Read Jammy DeSousa list Big Data applications that can be used for physical security on Facility Executive : In the world of physical security, now driven so heavily by cutting-edge technology, there is information coming in from a multitude of data points. Read his full article here.

How to put your physical security systems into the cloud

Read explain how companies can put their physical security systems into the cloud on IFSEC Global : The cloud era has the potential to change every aspect of physical security, offering alternative ways of doing things, opportunities to realise greater long-term value from legacy systems, and capabilities that have simply never existed before. Read his […]