Archives: 'Security spending'

Doug Bedell — April 6, 2020, 4:37 pm

Making Workplace Messaging Secure From Anywhere

COVID-19 has been prompting or accelerating new approaches to communicating at work, starting from home. The ThreatPost blog takes a look at where we are with that. “For organizations leaning on these platforms, security should be top of mind. A failure to lock down Slack et al could lead to data breaches, brand damage, malware […]

Doug Bedell — June 30, 2017, 12:57 pm

Police Using New ‘Situational Awareness’ Body Cameras

From Mississippi via Government Security News comes word that police use of body cameras is expanding from clip-on push-button cameras to automatic situational awareness cameras that “turn on automatically in key situations and communicate with other officers and supervisors”. “Both the BodyWorn camera and the Rocket IoT, singularly or in conjunction,” the Government Security post […]

Doug Bedell — April 4, 2017, 8:39 pm

Now the Wealthy, At Least, Can Buy Cyber Insurance

How much wealthy people appreciate it, we don’t know. But they are better able, or even simply eligible, to buy insurance against computer security attacks than other folks. The Security Ledger website advises that “Insurance giant AIG announced Monday (April 3) that it has started offering cyber insurance to protect individuals and families from ransomware […]

Doug Bedell — February 19, 2017, 9:22 am

Know What You’re Protecting, and How Best to Do It

Before deciding how best to protect your physical security assets, know what you’re protecting. Sounds basic, and it is. But ASIS International provides a checklist for Physical Security Assessment that will help make your priorities assuredly valid and clear. ASIS lists four sets of tasks, each with a lot to consider, that will help insure […]

Doug Bedell — January 31, 2017, 2:05 pm

More About Drones, and Their Security Role

Here’s an update on the use of drones for emergency management and security functions. This Emergency Disaster and Emergency Management post calls it “tremendously important” for crisis managers (police, fire and emergency medical personnel, among others) to consider purchasing a drone, or drones, for gathering useful information at a disaster scene. “Used properly,” drones “can […]

Doug Bedell — December 19, 2016, 4:23 pm

CEOs’ ‘Naive’ About About Their Cyber Defenses

Hard to believe, but Website Magazine reports that CEOs are underestimating their vulnerabilities to cyber attack, threatening the security of their digital systems. “Specifically,” Website’s Peter Prestipino reports, “PricewaterhouseCoopers’ 2015 Global State of Information Security Survey projected that financial losses from cyber-attacks will jump from $500 billion in 2014 to more than $2 trillion in […]

Doug Bedell — September 30, 2016, 11:52 am

Nasty Weather Coming, Along With Its Own Security Concerns

We don’t normally venture into weather forecasting, but dire atmospheric outlooks should be considered as site security concerns. So here’s one from Government Security News: “The National Oceanic and Atmospheric Administration (NOAA) recently revised its 2016 Atlantic hurricane outlook, calling for a higher likelihood of an above-normal season which often brings heavy rains and storms.” […]

Doug Bedell — August 12, 2016, 12:18 pm

The Latest Software–Equipped Cars May Not Be Secure

Doug Bedell — July 8, 2016, 3:10 pm

Digital’s Weight In Security Challenges

Continuing its focus on the longer-term outlook for corporate security, Security magazine distills the “top ten strategic issues that I (writer Kevin Coleman) have encountered working at the C-level.” They include a cross-section of what it takes to operate an organization effectively, efficiently and securely in this continually emerging period in which digital capacities and […]

Doug Bedell — July 1, 2016, 11:42 am

Presidential Politics Prompts Hackers

“If you’re involved with the 2016 elections,” the Safe & Savvy blog advises, “assume you’re being hacked.” Yes, “Cyber espionage is more and more likely to play a significant role in the extraordinarily consequential elections taking place in 2016.” There have already been instances of it. And the intrusions can come from anywhere in the […]