Archives: June, 2012

Doug Bedell — June 27, 2012, 10:20 am

Nuances of Perimeter Security

Let’s leave entry points aside for a bit, assuming they’re well-protected by (PRO Barrier) vehicle barriers. There remains the entire perimeter to be concerned about. Sites with lengthy ones, like airports, will be interested in this discussion from Aviation Security International on “Man vs. Nature: Taking Back Perimeter Security.” The piece makes distinctions between Probability […]

Doug Bedell — June 25, 2012, 11:55 am

Security Threats: Not Only At Your Gates

Security threats, we must acknowledge and note, aren’t only to be found at your perimeter gates. They’re getting ever more prevalent, and cunning, on your internal networks, too – in the form of social engineering. As troubling evidence, there’s this post on the Dark Reading blog. For example: “On a chaotic workday, a top executive […]

Doug Bedell — June 21, 2012, 11:54 am

Corporate Security on the Systems Level

Security Magazine interviews several chief security officers (CSO) to get an up-close sense of all that the corporate security function involves these days. That takes a pretty broad vision.”Our organization’s mission, ” says Dave Komendat, Vice President and CSO of Boeing,  “is focused on providing risk management services to protect people, property and information anywhere […]

Doug Bedell — June 19, 2012, 1:46 pm

New Book on Managing Information Security

What looks like a useful overview presentation on information security management and training is available in the form of a new book by Evan Wheeler, “Security Risk Management,” published by Syngress. “Evan Wheeler’s book,” says  Kevin A. Cassidy on the Security Management blog, “provides security and business continuity practitioners with the ability to thoroughly plan […]

Doug Bedell — June 13, 2012, 10:00 am

IDs Being Faked With Finesse

When is an ID not an ID? When it comes meticulously made from a fraud shop in China or elsewhere overseas. USA Today reports that international forgers are producing fake IDs “that can bypass even the newest electronic digital security systems, according to document security experts.” “Most troubling to authorities,” says the report, “is the […]

Doug Bedell — June 11, 2012, 8:41 am

9/11 Began ‘The Homeland Security Era’

Many of us feel this instinctively, but the 9/11 attacks are being cited as the beginning of a new era in U.S. history, the era of Homeland Security, a new catastrophic era. 9/11 wasn’t just a date to set calendars by, but to anticipate an uneasy future very different from a secure past. Philip J. […]

Doug Bedell — June 6, 2012, 11:21 am

Schneier, Other Gurus, Hold Fifth Workshop on ‘Security and Human Behavior’

Bruce Schneier, the Web security guru, has joined with Google (this year) to host the  Fifth Interdisciplinary Workshop on Security and Human Behavior in Lower Manhattan. His post on the meeting includes a list of the participants and links to readings from each of them. He’s also got links to the earlier workshops and Ross […]

Doug Bedell — June 1, 2012, 11:00 am

Ground Security Sensors Look Like Rocks

Add another possible perimeter patrol technique: Spreading rock-like sensors on the ground you want to protect. The U.S. is doing it in Afghanistan. And the Border Patrol  has spread 7,500 “unattended ground sensors” (UGS) along the Mexican border to detect illegal crossings. Wired’s Danger Room reports that the sensors are updates of the acoustic monitors […]