Tag Archives: Security

System Design Best Practices for Consulting Engineers

The disconnect between design professionals and their clients has been an aspect of project delivery that I have lived with most of my career. I never truly understood the cause, but I understand better now… in retrospect. My recent consulting … Continue reading

Posted in Consulting Engineering, Physical Security, Technology | Tagged , , , , , , , | Leave a comment

How is Security Consulting/System Design Changing?

Is Security ONE Discipline? In speaking with end-users, I never cease to be amazed at the expectation for a consultant’s knowledge-base and skill-set. I have been working in physical security for over 30 years and I feel just recently I … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology, Technology Convergence | Tagged , , , , , , , , , , , , , | Leave a comment

Evolution of Cybersecurity & Countermeasures

Just returned from speaking at the annual PSATec┬áConference (www.psasecurity.com) and was thoroughly surprised by the strong emphasis on Cybersecurity… For those that don’t know PSA, it is an organization that supports a large national group of physical security integrators. While … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Integration, Physical Security, Technology, Technology Convergence | Tagged , , , , , , , , , , , , | Leave a comment

Encryption – THE Constitutional Issue of Our Day

I know the majority of folks holding positions in our public legal system and in law enforcement are good people trying to do what’s right… and I badly want to believe Police Departments and District Attorneys will be responsible with … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Technology | Tagged , , , , , , , | Leave a comment

Innovation – Are You Listening?

What is Innovation? Is innovation simply developing NEW products? We are told, new products are the result of the innovation process. So, how does this thinking apply to the Security Industry? True innovation requires insight, vision and APPLICATION! The insight … Continue reading

Posted in Cybersecurity, Data Security, Identity Management, Information Security, Integration, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , | Leave a comment

Prepare for Identity Management in Physical Security to Change Drastically

Smartphones & Big Data Many of our everyday online activities are leveraging authenticating digital identities, cloud data resources and mobile convenience. As all of us come to depend more on smartphone functionality (pay at the pump, ATM’s, building access, network … Continue reading

Posted in Big Data, Cybersecurity, Data Security, Identity Management, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , | Leave a comment

76 Percent of Organizations Breached in 2015

  This figure was both a surprise… and not. The majority of cyber attacks are not reported, for good reason. It is embarrassing for private enterprise to publicly report a data security breach. There is an obvious negative impact on … Continue reading

Posted in Cybersecurity, Data Security, Identity Management, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Reality Check: Critical Info Transmitted via Simple Bit Data?

What Information Should We Trust? In business meetings recently, the issue of data encryption arose and it jolted me back to reality. Most physical security professionals seem to think Information Security (InfoSec) – IS ONLY – IP Security (IPSec). Everyone … Continue reading

Posted in Data Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , | 1 Comment

Maintaining Relevance in a Dynamic Landscape

Now, there’s the rub! Is the consultant addressing topics relevant to the client’s perceived need, or just addressing his/her area of expertise? We live in a world where organizations face a diverse array of threats. The daunting task of the … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , | Leave a comment

Security Automation: Responding to Disruptive Technology

Is this War, or an Opportunity? After taking a short few weeks to investigate the InfoSec space and speak with several ISC2 certified CISSP’s… it would appear the convergence and overlap of Data and Physical Security is creating misconceptions regarding … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , | Leave a comment