Tag Archives: CIO

Innovation – Are You Listening?

What is Innovation? Is innovation simply developing NEW products? We are told, new products are the result of the innovation process. So, how does this thinking apply to the Security Industry? True innovation requires insight, vision and APPLICATION! The insight … Continue reading

Posted in Cybersecurity, Data Security, Identity Management, Information Security, Integration, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , | Leave a comment

Prepare for Identity Management in Physical Security to Change Drastically

Smartphones & Big Data Many of our everyday online activities are leveraging authenticating digital identities, cloud data resources and mobile convenience. As all of us come to depend more on smartphone functionality (pay at the pump, ATM’s, building access, network … Continue reading

Posted in Big Data, Cybersecurity, Data Security, Identity Management, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , | Leave a comment

Security Automation: Responding to Disruptive Technology

Is this War, or an Opportunity? After taking a short few weeks to investigate the InfoSec space and speak with several ISC2 certified CISSP’s… it would appear the convergence and overlap of Data and Physical Security is creating misconceptions regarding … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , | Leave a comment

How to be Relevant to I.T. Professionals

I.T. Expanding Influence into Related Trades It really doesn’t matter which technology products/systems you offer today, the end-user approval process will eventually pass through the I.T./I.S. group. While the buying decision is likely to be based on the need and … Continue reading

Posted in Physical Security, Technology | Tagged , , , , , , | Leave a comment