Archives: 'Perimeter Security'

Doug Bedell — January 5, 2018, 11:32 am

A Primer on Designing Vehicle Security Barriers

On its website, PRO Barrier Engineering offers a primer on the different types of anti-terrorism vehicle barriers. At the start of a new year, it’s appropriate to refresh one’s understanding of barriers and what they offer in terms of protection for given circumstances. PRO Barrier thereby explains the differences between wedge, beam and mobile barriers, […]

Doug Bedell — December 8, 2017, 1:40 pm

Perimeter Security Involves Length, Sizes and Values

You may think that securing a perimeter is simply a matter of putting up a fence and letting it be. Not so, notes the Advanced Perimeter Systems blog. It depends on the perimeter in question and what’s inside it. Here, for example, are three perimeter settings – an international airport, the Great Pyramids of Giza […]

Doug Bedell — November 10, 2017, 2:23 pm

‘Contactless Access Control’ Becoming an Industry Priority

At whatever level, from doorways to lengthy perimeters, access control is becoming an ever-more pressing security need for enterprises. That was clear from a recent discussion at a Security Industry Association conference in New York reported on by SecurityInfoWatch. “I don’t think we are just five years away from total contactless entry. I think it […]

Doug Bedell — October 23, 2017, 7:14 am

Here Are the ABCs of Security Risks

The website of the Threat Analysis Group in Houston, Texas, excels in clear security thinking. There are, TAG advises, assets, threats, vulnerability, and risk – risk being the intersection of assets, threats and vulnerabilities. The problem is, though, that threats can’t be assessed with much in the way of certainty. They arise, are assessed and […]

Doug Bedell — October 16, 2017, 9:22 am

Getting Acquainted in Challenging Security Times

Google “physical perimeter security” and the first item to appear dates to March, 2013 – “The 5 D’s of Outdoor Perimeter Security”. In today’s digital world, four years can make a post a security classic. So what are the “5 D’s”? Kevin Marier, founder and CEO of Connex International, Inc., who wrote the piece, identifies […]

Doug Bedell — October 6, 2017, 2:17 pm

Las Vegas Massacre Becomes a New Security Threshold

Quoting experts, Joel Griffin on the Security InfoWatch blog thinks the Las Vegas shooting massacre “will likely serve as a game-changing incident for the security industry.” From hotel front desks and room service staffs to stadiums and open-air venues, the question will consistently become, “Are we sure we’re secure. Do we realize what could happen […]

Doug Bedell — September 27, 2017, 10:32 am

Police Using Garbage Trucks Against Vehicle Terror Attacks

Police have been getting creative in protecting against vehicle terror attacks – even to using garbage trucks as security barriers. That was the thrust this month in a National Public Radio report explaining “why the garbage truck is on the cutting edge of law enforcement.” “Even the Trump tower in Manhattan has been encircled by […]

Doug Bedell — September 6, 2017, 8:12 pm

Security for All Seasons, Providing We Plan Ahead

With hurricanes roiling the Gulf and now threatening the East Coast, it’s timely, indeed, that September turns out to be National Preparedness Month. The Department of Homeland Security’s motto for the month is “Disasters don’t plan ahead. YOU CAN.” True enough. DHS lists both specific and general steps to take to be as secure as […]

Doug Bedell — September 5, 2017, 11:03 am

Drones Becoming Border Jumpers Too

Drones, as we’ve noted before, are becoming an increasing security risk. Here, in a post on Homeland Security, we find smugglers using the new, larger size drones to fly drugs across the U.S.–Mexico border. “Most commercial drones are relatively small and somewhat fragile—meaning that they can’t carry much more than a camera just so they […]

Doug Bedell — August 16, 2017, 2:47 pm

Good Security Takes Continuing Attention, Discernment

Good security starts with continuing attentiveness to what is being kept safe from intrusion. The attendent circumstances don’t lend themselves to trivialization or distortion, as Brian Krebs discusses in a post headed “Beware of Security by Press Release”. As Krebs explains, “It goes a bit like this: A security firm releases a report claiming to […]