Archives: April, 2014

Doug Bedell — April 30, 2014, 9:59 am

We’re Open to Access Control Innovation

American City & County has a post reflecting on how fiber optic cable and wireless communication increasingly are the preferred technologies for communication networks. Brainstorming and innovation are the order of our times. PRO Barrier Engineering gets that. We invite you to connect and brainstorm with us on your site security needs. Together, we might […]

Doug Bedell — April 28, 2014, 4:55 pm

PRO Barrier Integrates Handily With a Customer’s Needs

Andrew Goldsmith on the Government Security News site notes that establishing a security checkpoint can be “rather daunting – particularly in today’s security environment of constantly changing protocols, mandates, equipment, and threats.” That may well be so with some vehicle access control systems. But we at PRO Barrier Engineering would like to note, indeed stress, […]

Doug Bedell — April 23, 2014, 12:51 pm

Employer and Employee Computer Rights

Here’s a good backgrounder on computer use in organizations – the sometimes conflicting needs of employee access for personal needs and the interest of employers in maintaining secure corporate networks. “The conflict between security and privacy is nothing new,” David Melnick writes on an Information week Dark Reading post. “What’s new is the revelation that […]

Doug Bedell — April 21, 2014, 11:33 am

Moxie at the Marathon

Wow! There are 9,000 more people running in the Boston Marathon today – 36,000 in all – than participated last year, when the race was wracked at the finish line by a terrorist’s bomb blast. Homeland Security Watch notes that over a million spectators are expected, double the average number, and Boston’s hotels have been […]

Doug Bedell — April 16, 2014, 4:12 pm

How DHS Responded to ‘Heartbleed’

The U.S. Department of Homeland Security (DHS) has been as concerned as any other branch of government, or anyone in the private sector, over the possibility of the Internet security breach “Heartbleed” raising havoc with corporate and personal computer-based information. Here’s what DHS said of the “Heartbleed” situation, in a Web posting issued April 5: […]

Doug Bedell — April 14, 2014, 1:14 pm

The Essential Security Setting: ‘Always On’

Security vigilance comes in one setting only – always on. That’s brought home by a pdf post from Domestic Security News noting the reality of differing arrival rates for vehicles at entry gates. On two occasions during “routine” morning delivery hours at a “sensitive public location” there was an 18 percent difference in unfamiliar vehicles […]

Doug Bedell — April 11, 2014, 1:37 pm

Internet Security: A Purported Solution to ‘Heartbleed’

You’ll no doubt be hearing about the “Heartbleed” Internet security breach that has endangered the security of personal information entrusted to supposedly secure websites and servers. Here, Government Security News promotes a presumably reliable software alternative, SAIFE, to protect user accounts while Internet security certificates are being updated. ‘”It’s unfortunate that so many people will […]

Doug Bedell — April 9, 2014, 11:31 am

Hospital Security Begins at Entryways

Hospitals are stressful places, for patients, their families and hospital staff members themselves. But they can at least be as secure as possible, places of safety as a prelude to healing. At the ISC West meeting (International Security Conference) just concluded, there was a panel on protecting hospitals from violence. Sad that the topic was […]

Doug Bedell — April 8, 2014, 11:14 am

Ultimate Computer Security Remains Elusive

Further computer security insights from Bruce Schneier: Be careful, he warns, about thinking you have undoubtedly secure computers. Schneier’s post, “‘Unbreakable’ Encryption Almost Certainly Isn’t,” makes for sobering security reading. He adds a couple of other sources for good measure and useful insight. It’s not that computers can’t be made usefully secure. But surely secure […]

Doug Bedell — April 4, 2014, 10:03 am

Bruce Schneier on Internet Security, as Experienced by Us

Bruce Schneier tries to sort through how actively the government and Internet proprietors are sharing information on individuals – willingly or unwillingly in the case of the web companies. He decides that both the government and the Internet sites have unclean hands when it comes to monitoring U.S. citizens. “It would be better,” he writes, […]