Introducing SecurPod - A Security Today Podcast

Introducing SecurPod - A Security Today Podcast

Mar 11, 2021

In this inaugural episode of SecurPod, Security Today and Campus Security & Life Safety Editor Ralph Jensen discusses securing a campus with President of M2 Consulting Mitch McKinley. Listen along as Ralph and Mitch talk about security from the outside in.

Duration: 19:16

Mitch McKinley

Hosted by Ralph Jensen


Apple Podcast Spotify Google Stitcher

Featured Podcast

  • Learn More about Drone Technology, Solutions

    Learn More about Drone Technology, Solutions

    In this episode of SecurPod, Ralph C. Jensen, editor-in-chief of Security Today magazine, talks with Jon Gruen, CEO of Fortem Technologies. Fortem Technologies is a well-known unmanned aerial surveillance manufacturer with experience on consumer and commercial applications, as well as on the battlefield for the past 10 months in Ukraine. Gruen highlights his experience and Fortem Technologies’ capabilities on a global platform, discussing the current state of the drone threatscape, both from a public and military standpoint. In addition, learn about what to expect from the C-UAS space in the future and the evolution of drone technology for years to come. Listen Now

  • DPSM is the Future of Cybersecurity

    DPSM is the Future of Cybersecurity

    In this episode of SecurPod Ralph C. Jensen, publisher of Security Today magazine, talks with Parandar Das, the co-founder and CEO of Sotero. The conversation centers around the data security market and how Data Posture Security Management (DPSM) seems to be the future of cybersecurity. Das answers questions of why companies are pivoting more toward a data-first approach to securing their cloud-based data. He also addresses the question of why current approaches to data security are no longer effective. Listen Now

  • Cybersecurity Strategies and Their Impact on Physical Security

    Cybersecurity Strategies and Their Impact on Physical Security

    In this episode of SecurPod, Ralph C. Jensen learns more about the impact of cybersecurity, cyber protection and system infrastructure on the physical security world as he talks with Jami McGraw, manager of product development at Seneca; and Ron Vantassel, technical solutions manager at Seneca. The conversation centers on the key differences between physical security and cybersecurity strategies in terms of protecting assets. The importance of cyber protection in relation to hardware infrastructure solutions, as opposed to software only, is also discussed. In addition, McGraw and Vantassel talk about replacing legacy infrastructure with hyperconverged infrastructure — a combination of servers and storage in a distributed infrastructure platform with intelligent software consisting of separate servers, storage networks and storage arrays to create flexible building blocks. Listen Now

Webinars

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • FlexPower® Global™ Series (FPG) from LifeSafety Power

    FlexPower® Global™ Series (FPG) from LifeSafety Power

    The FlexPower® Global™ Series (FPG) from LifeSafety Power—designed to provide DC power for access control systems in international applications—is now PSE listed for Japan and compatible with the country’s 100VAC applications. 3

  • HID Signo Readers

    HID Signo Readers

    HID Global has announced its HID® Signo™ Biometric Reader 25B that is designed to capture and read fingerprints in real-world applications and conditions. 3