August 2017
- The First Rule, Encrypt
- Gearing Up for the Challenge
- Curbing the Violence
- Implementing a Data-centric Approach
- Securing the City
Features
Securing and protecting one of the largest U.S. sporting complexes
By Chuck Han
While the goal of this campus was to provide a facility for athletes to compete, it was the family, friends and spectators who had a big impact on how it was designed.
Violence in the workplace continues to escalate; healthcare workers at risk
By Paul Baratta
Let me let you in on a troubling, not-so-little secret: violence in the workplace is continuing to escalate in medical facilities, despite the fact that national assault rates have been dropping in recent years.
When implementing a card-based system, protect yourself
By Scott Lindley
It used to be that the most important aspect of implementing an electronic access control system was the simple control of who went where when. Today, the requirements of these sophisticated systems go beyond.
Reducing costs is as equally important goal in operating an enterprise
By Kim Rahfaldt
A company is much more complex than an IT department or a number of buildings. It is always evolving and adding more servers, buildings and systems, and therefore, obtaining more risk, costs and threats.
Do you know who’s lurking beyond your cameras?
By Robert Jones
The last major advancement in commercial perimeter security was the introduction of CCTV cameras.
Fresno PD may have technology advantage in their backyard
By Ralph C. Jensen
No matter where any given city places a video surveillance camera, there are privacy concerns. There is, however, another side to the story.
How a new generation of video analytics is empowering the next generation of superheroes
Thanks to new advancements in video analytics technology and powerful Internet of Things (IoT) edge devices; these superheroes can now be armed with new superhuman capabilities to better protect us.
Surveillance used to protect people, places and assets
By Rod Coles
Video is a natural choice for security because as humans, we use our eyes more than any of our other senses.
Understand its uses for banking customers and employees
By Bill Spence
Many financial institutions are looking to biometrics to enhance customer trust and convenience, and for securing the bank enterprise and facilities.
Departments
Industry Professional
Securing the Amsterdam Metro Underground
By John Moa
The lock system of the Amsterdam underground is quite extensive and includes 2,574 cylinders. GVB was able to find and implement a system that solved their key issues as well as environmental issues.
Industry Focus
By Ralph C. Jensen
When you walk through the CyberLock facility with Tammy Davis, you truly get a sense of pride, responsibility and an amazing relationship she has developed within the community.
Industry Vertical
Examining why closed-network systems are not immune to cyber threats and how cloud services add layers of security to minimize risk
By Francis Lachance
The security of corporate data is critical to the integrity of operations. Yet, everywhere we turn, it seems like another company has become victim to some form of cyber threat, malware or ransomware attack.
Networking Security
By Ralph C. Jensen
The most pervasive cyber threat in the past 11 years has been ransomware infections. Who would have even known about something like this 30 years ago, but here we are trying with all diligence to protect folders and files, or even worse, the entire hard drive.
Security fundamentals form a line of protection
By Jeffrey Carpenter
For many years, the sage advice for cybersecurity leaders has been to take a layered approach to security, and those words have served the industry well. Unfortunately, cracks in those layers continue to leave organizations vulnerable to security attacks.
Encryption is used to foil decryption tools
By Rishi Bhargava
Between 2005 and 2016, ransomware infections were more common than data breaches, making them the most pervasive cyber threat of the last 11 years. Ransomware attacks may encrypt folders and files or even the entire hard drive, or they may just lock the devices so that users cannot access them.
Amid security threats, end users must consider IoT and M2M
By Julian Weinberger
With the rising popularity of the Internet accessible machines, the need to protect connections between the disparate ATMs and the banks’ processing centers became critical.