INSIGHTS FROM OUR EXPERTS
Security 4.0 The Road to the FutureAs an industry, security must be mindful of taking an untried path, to avoid opening up security risks as we make the transition to Security 4.0. If done correctly, our transition will bring similar benefits in efficiency, effectiveness, and overall empowerment for the human side of the human-technology team.
Why Moving to a Risk-Based Approach Helps BusinessToday’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis.
Optimize Your Security Program with an Intelligence Collection Plan (ICP)With the U.S. economy firing on all cylinders it is a good reason for savvy leaders to think about protecting their key assets from exposure to ever-evolving internal and external security risks.
Must-Have Business Skills for a Security Risk Management ProgramChange is never easy and for many of us who have been in the security industry for a while, our comfort zone is in the “nuts and bolts” of our day-to-day tactics. We know our details.
How Leveraging Big Data Changes the Perception of SecuritySecurity professionals are challenged by a negative perception that exists in the security industry, and most likely in their own organizations. Physical security is often viewed as a cost that is more of a burden to the organization than a benefit.
The Connected OfficerJoe Young, Senior Vice President of Innovation at G4S, explains how hidden technology and technical know-how will form a critical role in delivering the next generation of security officers.
Artificial Intelligence in Safety: What Comes Next?Some of the advantages or AI to the security industry will include a reduction of costs in security labour and a lower overall exposure of security professionals to risky situations.
Why Campus Environments Should Choose a Unified Security SolutionCampus environments experience many challenges when it comes to securing their facilities. University environments need to find the right balance between having an open environment and a secure environment. Students need to feel secure, but don’t want to feel like their residence hall is restrictive.
Consumerization of Commercial SecuritySenior Vice President of Innovation at G4S, Joe Young, explains how advances in video games, mobile phones, televisions and more will disrupt commercial security.
Security and Drones: A Force for GoodWhen people think about drones, it’s generally not in a positive light. But the technology that has long been viewed as a means to invade privacy, or threaten businesses, governments and industrial operations, actually has the potential to play a significant role in integrated security programs.
Securing the Hydropower Energy IndustryThe hydropower industry converts energy from flowing water into electricity. Originally used for mechanical milling, such as grinding grains, today’s hydro plants produce electricity with turbines and generators using a dam, reservoir or flowing river. This natural source of energy encompasses a wide variety of sites and layouts, often remotely located, geographically large, and difficult to get to and maintain.
Securing the Petrochemical Industry TodayThe best way to determine how to meet regulatory requirements is to conduct a thorough risk analysis and any gaps should be analyzed and resolved over time. The organization should work with their security partners and consultants to find technology-based solutions to the security gaps wherever possible.
Securing Renewable Energy TodayThe U.S. energy infrastructure is the cornerstone of the economy. Without a working energy grid, daily life as we know it would grind to a halt and both health and welfare would be in danger. That is why securing critical infrastructure is considered a top priority, and is highly regulated, often subject to local and state as well as federal guidelines from organizations such NERC (North American Reliability Corp.) that govern both physical and cyber security concerns.
What you Need to Know About Intelligent Parking AreasThere is a technology evolution happening in our parking spaces. Solutions for access control, solutions to manage vacancies, and solutions to promote safer environments are now a reality.
How to Create Efficiencies with Low Cost of Deployment and OwnershipEnd-user needs are changing because the dynamics of how organizations function are changing. Companies are forced to use the cost down approach and do more with less. What does that mean?
What is Open and Why is it Important?There has been a lot of discussion occurring in the security industry lately around open versus proprietary technology. End users prefer to deploy systems they deem as open, versus systems that are viewed as proprietary.
Onboarding Best Practice Delivers Secure, Compliant EnvironmentThe security landscape has evolved and new threats have emerged for organizations. Security teams need to do more with their systems to keep their employees, assets and building secure.
Slamming the Door on CloningThe duplication of access credentials can affect access cards, key chains tags or fobs. The cloning of credentials creates a security breach. This is a threat to the integrity of your access control system.
You should have a good general knowledge of your security program and be able to rate the effectiveness of its components. Complete the risk survey, and receive an analysis of the highest rated security risks your organization faces. Your responses are compared against industry standards and generally accepted practices of security risk assessment.