Archives: 'Security Planning'

Doug Bedell — December 8, 2017, 1:40 pm

Perimeter Security Involves Length, Sizes and Values

You may think that securing a perimeter is simply a matter of putting up a fence and letting it be. Not so, notes the Advanced Perimeter Systems blog. It depends on the perimeter in question and what’s inside it. Here, for example, are three perimeter settings – an international airport, the Great Pyramids of Giza […]

Doug Bedell — December 4, 2017, 1:18 pm

A Security Tale: Truant With a Plastic Bag

Here’s an off-the-beaten path piece from Naked Security about the efficacy of almost anything an employer might issue to track his or her employees during business hours. The employer of an electrician in Australia issued a GPS-enabled personal digital assistant (PDA) to an employee who, sad to say, placed it in an electrically conductive “cheese […]

Doug Bedell — November 24, 2017, 9:46 am

Our Web Tracks Can Be Followed by the Sites We Visit

Referencing security researchers at Princeton University, Bruce Schneier provides information on how websites may be collecting and storing our every move on them for playback to their owners. “The stated purpose of this data collection includes gathering insights into how users interact with websites and discovering broken or confusing pages. However the extent of data […]

Doug Bedell — November 17, 2017, 11:23 am

Watch Out: You’re Not As Secure As You Think You Are

You think you’ve got a reliable home or business security camera or wireless router. Maybe so, maybe not. “Several widely available security cameras and wireless routers can be easily hacked to reveal customers’ video feeds online, InHomeland Security reports, reigniting privacy concerns four years after the Federal Trade Commission filed charges to eliminate similar vulnerabilities.” […]

Doug Bedell — November 10, 2017, 2:23 pm

‘Contactless Access Control’ Becoming an Industry Priority

At whatever level, from doorways to lengthy perimeters, access control is becoming an ever-more pressing security need for enterprises. That was clear from a recent discussion at a Security Industry Association conference in New York reported on by SecurityInfoWatch. “I don’t think we are just five years away from total contactless entry. I think it […]

Doug Bedell — November 8, 2017, 2:50 pm

Aircraft-Sized Drones Are Flown By ‘Pilots’ Via Computers

Drones used to be little bigger in size than model airplanes. Not any longer. Military surveillance drones like the RQ-4 Global Hawk are unmanned security vehicles about as large as fighter planes. And enlisted airmen, DefenseTech advises, are lining up to fly them via on-the-ground computer controls. “‘This is an opportunity for active-duty airmen in […]

Doug Bedell — November 6, 2017, 10:50 am

Texas Church Latest Mass Shooting Scene

The dour security climate in the U.S. takes us now to a Texas church where, as SecurityInfoWatch reports, 26 worshippers were killed and and 20 more wounded. “As the gunman exited the church, a neighbor with a gun opened fire on him, forcing the attacker to drop his weapon and flee in his SUV. The […]

Doug Bedell — November 3, 2017, 9:06 am

N.Y. Bike Path Attack: ‘Softer’ Targets Coming Into Vogue

Now it’s a peaceable bicycle path in New York City that became the scene of a deadly terror attack. Is no setting safe? Probably not – that’s, at least, what we need to assume. “Tuesday’s attack,” writes Walter Smith on Security InfoWatch, “is an unfortunate but poignant side-effect of responsible government resource prioritization; increasing means […]

Doug Bedell — October 25, 2017, 3:13 pm

Cyber Vigilantes Suggesting a ‘National Security Action Plan’

There are cyber security vigilantes – meet some of them on SecurityInfoWatch who have styled themselves #CyberAvengers. If you need help or solace with your concerns over computer security, this might be a good group to check in with. They’re seeking to cripple “nefarious actors operating in cyberspace seeking to exploit whatever their tapping fingers […]

Doug Bedell — October 23, 2017, 7:14 am

Here Are the ABCs of Security Risks

The website of the Threat Analysis Group in Houston, Texas, excels in clear security thinking. There are, TAG advises, assets, threats, vulnerability, and risk – risk being the intersection of assets, threats and vulnerabilities. The problem is, though, that threats can’t be assessed with much in the way of certainty. They arise, are assessed and […]