Tag Archives: Data Encryption

Impact of Disruptive Tech on Business and the Workforce

Is Working Hard Good Enough? We all have a tendency to keep our head down and live in our own discipline, or trade,¬†ignoring the impact of related technologies and/or related industries. After all, most of us were taught focus = … Continue reading

Posted in Technology | Tagged , , , , , , , , , , , | Leave a comment

How is Security Consulting/System Design Changing?

Is Security ONE Discipline? In speaking with end-users, I never cease to be amazed at the expectation for a consultant’s knowledge-base and skill-set. I have been working in physical security for over 30 years and I feel just recently I … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology, Technology Convergence | Tagged , , , , , , , , , , , , , | Leave a comment

Evolution of Cybersecurity & Countermeasures

Just returned from speaking at the annual PSATec¬†Conference (www.psasecurity.com) and was thoroughly surprised by the strong emphasis on Cybersecurity… For those that don’t know PSA, it is an organization that supports a large national group of physical security integrators. While … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Integration, Physical Security, Technology, Technology Convergence | Tagged , , , , , , , , , , , , | Leave a comment

Encryption – THE Constitutional Issue of Our Day

I know the majority of folks holding positions in our public legal system and in law enforcement are good people trying to do what’s right… and I badly want to believe Police Departments and District Attorneys will be responsible with … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Technology | Tagged , , , , , , , | Leave a comment

Innovation – Are You Listening?

What is Innovation? Is innovation simply developing NEW products? We are told, new products are the result of the innovation process. So, how does this thinking apply to the Security Industry? True innovation requires insight, vision and APPLICATION! The insight … Continue reading

Posted in Cybersecurity, Data Security, Identity Management, Information Security, Integration, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , | Leave a comment

76 Percent of Organizations Breached in 2015

  This figure was both a surprise… and not. The majority of cyber attacks are not reported, for good reason. It is embarrassing for private enterprise to publicly report a data security breach. There is an obvious negative impact on … Continue reading

Posted in Cybersecurity, Data Security, Identity Management, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Reality Check: Critical Info Transmitted via Simple Bit Data?

What Information Should We Trust? In business meetings recently, the issue of data encryption arose and it jolted me back to reality. Most physical security professionals seem to think Information Security (InfoSec) – IS ONLY – IP Security (IPSec). Everyone … Continue reading

Posted in Data Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , | 1 Comment

Security Fears vs. Awareness

I had an interesting conversation last year with a Data Security Consultant, Mark Turturo, CISSP. I have been working since then to better understand the mission of these professionals and their relevance to the physical security specialist. I operate in … Continue reading

Posted in Cybersecurity, Data Security, Physical Security, Technology | Tagged , , , , , , , , , | Leave a comment

2015 ASIS Global Conference Review

The weekend recovery begins, after a long (but productive) ASIS focused week… This year I spent time walking the trade show floor and thinking about larger physical security industry issues and how the ASIS Conference is positioned. End-User Focused Event … Continue reading

Posted in Physical Security, Power Distribution, Technology | Tagged , , , , , , , , , | Leave a comment

Secure Data and Identity Management Solutions

As automated building systems become more dependent on shared network infrastructure, I.T. (Information Technology) Directors and CISO’s (Chief Information Security Officers) are beginning to realize these systems are adding significant vulnerabilities and risks to their network and sharing this realization … Continue reading

Posted in Cybersecurity, Physical Security, Technology | Tagged , , , , , , , , , , | Leave a comment