Monthly Archives: January 2016

The Most Basic Physical Security Vulnerability

Mechanical Key Override I am so often amazed to see Security Integrators uninterested in the end-user/owner’s decision how to manage a mechanical key override solution for electronic access control. This is the most severe, easily recognized vulnerability in the entire … Continue reading

Posted in Identity Management, Integration, Physical Security, Technology | Tagged , , , , , , , | Leave a comment

Reality Check: Critical Info Transmitted via Simple Bit Data?

What Information Should We Trust? In business meetings recently, the issue of data encryption arose and it jolted me back to reality. Most physical security professionals seem to think Information Security (InfoSec) – IS ONLY – IP Security (IPSec). Everyone … Continue reading

Posted in Data Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , | 1 Comment

Maintaining Relevance in a Dynamic Landscape

Now, there’s the rub! Is the consultant addressing topics relevant to the client’s perceived need, or just addressing his/her area of expertise? We live in a world where organizations face a diverse array of threats. The daunting task of the … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , | Leave a comment

Security Automation: Responding to Disruptive Technology

Is this War, or an Opportunity? After taking a short few weeks to investigate the InfoSec space and speak with several ISC2 certified CISSP’s… it would appear the convergence and overlap of Data and Physical Security is creating misconceptions regarding … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , | Leave a comment