Security and privacy are coming increasingly into conflict, but security, no surprise, is winning. Witness the new body scanners that are being installed on the Los Angeles’ subway, the first such installation in the U.S In Homeland Security reports that “The machines scan for metallic and non-metallic objects on a person’s body, can detect suspicious […]
Archives: 'Security Planning'
The U.S. Department of Homeland Security has placed a clever video, “Take the Challenge”, on its home page. It’s intended to test our powers of observation and awareness. What, you say, I’ll never been in a threatening situation? That’s the whole point, we can never assume never when it comes to security. Thanks DHS!
Bruce Schneier discusses airport security, in the wake of a report that the Transportation Security Administration is considering eliminating security at U.S. airports that fly only smaller planes – 60 seats or fewer. “Passengers connecting to larger planes would clear security at their destinations.” If this sounds like a cockamamie approach to airport security, Schneier […]
Security against drone attacks was tested in Venezuela on August 6. The two drones involved lost, and Venezuelan President Nicolas Maduro, the target of the attacks, won. This from Security InfoWatch. “The plot was foiled, in part, by equipment designed to jam radio signals…. “Six suspects were in custody in connection with the Saturday attack, […]
Whether we need to worry about cyber intrusions into U.S. security or not, the Department of Homeland Security is concerned enough that, on July 31, it hosted “the first-of-its-kind National Cybersecurity Summit in New York City, bringing together industry partners and top federal officials with the goal of laying out a vision for a collective […]
In computer security, people get confused over the term “Cloud”, such as in storing information safely in “the Cloud”. Adnan Raja discusses the subject of Cloud security in a post on the securitymetrics blog. The Cloud is a term for online storage of backup information, as provided by Google, Apple, Amazon, IBM or lesser known […]
Insiders in organizations can – indeed, have been – responsible for more security breaches than employers would like to acknowledge. This, an observation by Jai Vijayan on the DarkReading site, ought to be giving managers pause, and reason for sharpening their organizational safeguards. “The key to dealing with insider threats,” Vijayan writes, “is to keep […]
“On the scene” at cloak and dagger covert operations: Protection Circle provides “Stories from the Field” so you can get a sense of what’s involved in conducting covert operations. Why would you want to know? Because they’re not just “cool”. Covert operations require knowledgeable planning and execution. But “once the operation is running properly, there […]
SecurityInfoWatch offers a primer on hiring security guards from contract providers. “You must pay the firm for its services,” the advisory reads, “on top of paying for the cost of wages, training, projected overtime, vacation accrual, payroll taxes, uniforms, benefits, and other specified or mutually agreed upon services.” Even so, “The cost of hiring a […]
For a change of pace, Protection Circle offers some “stories from the field” on how covert security operations can be difficult, risky, expensive, or just funny, to manage. Such as, “…a production company client from Los Angeles that wanted a certain celebrity who was attending an event in San Francisco to receive covert protection. This, […]