You may think that securing a perimeter is simply a matter of putting up a fence and letting it be. Not so, notes the Advanced Perimeter Systems blog. It depends on the perimeter in question and what’s inside it. Here, for example, are three perimeter settings – an international airport, the Great Pyramids of Giza […]
Archives: 'Business Risk Planning'
Here’s an off-the-beaten path piece from Naked Security about the efficacy of almost anything an employer might issue to track his or her employees during business hours. The employer of an electrician in Australia issued a GPS-enabled personal digital assistant (PDA) to an employee who, sad to say, placed it in an electrically conductive “cheese […]
Referencing security researchers at Princeton University, Bruce Schneier provides information on how websites may be collecting and storing our every move on them for playback to their owners. “The stated purpose of this data collection includes gathering insights into how users interact with websites and discovering broken or confusing pages. However the extent of data […]
George Mateaki on the Security Metrics blog explains penetration testing – Network Penetration Testing 101 – and why it’s advisable for businesses to confirm the security of their workaday environments.` “Penetration testing, in general,” Mateaki explains, “is a type of ‘ethical certified hacking’ during which a pen tester will attempt to enter and exploit your […]
You think you’ve got a reliable home or business security camera or wireless router. Maybe so, maybe not. “Several widely available security cameras and wireless routers can be easily hacked to reveal customers’ video feeds online, InHomeland Security reports, reigniting privacy concerns four years after the Federal Trade Commission filed charges to eliminate similar vulnerabilities.” […]
At whatever level, from doorways to lengthy perimeters, access control is becoming an ever-more pressing security need for enterprises. That was clear from a recent discussion at a Security Industry Association conference in New York reported on by SecurityInfoWatch. “I don’t think we are just five years away from total contactless entry. I think it […]
The website of the Threat Analysis Group in Houston, Texas, excels in clear security thinking. There are, TAG advises, assets, threats, vulnerability, and risk – risk being the intersection of assets, threats and vulnerabilities. The problem is, though, that threats can’t be assessed with much in the way of certainty. They arise, are assessed and […]
The Department of Homeland Security advises that October is “National Cyber Security Awareness Month”. That makes it a good time to provide a renewed list of cybersecurity safety tips. They come down to be alert, be updated, and love those passwords! Seriously, cybersecurity is requiring increasing attention, and will continue to do so.
Google “physical perimeter security” and the first item to appear dates to March, 2013 – “The 5 D’s of Outdoor Perimeter Security”. In today’s digital world, four years can make a post a security classic. So what are the “5 D’s”? Kevin Marier, founder and CEO of Connex International, Inc., who wrote the piece, identifies […]
Much as we’d like to put behind us the massacre at the Mandalay Bay hotel in Las Vegas, there is much to be learned from an actual security crisis. And one, argues Tom M. Conley, on the Security magazine blog that amounted to “a catastrophic security failure.” (Conley is the President and CEO of the […]