Archives: June, 2013

Doug Bedell — June 28, 2013, 9:43 am

Physical, Digital Security Both Vital to Today’s Enterprises

The Harvard Business Review Blog Network has it right: There’s no physical security without data security, and vice versa. A hacker’s hit on your corporate data can compromise the firm as much, even more, as driving through an unsecured front gate.  CEOs, HBR says, need to understand what CSOs do and why they’re vital to […]

Doug Bedell — June 26, 2013, 10:04 am

Crisis Response Plans Need to be Detailed – and Followed

An essential element in security preparedness is a crisis communication plan – how you will respond should a crisis strike your organization. You can be completely “secure” on the ground and still mess up a crisis, should you be hit by one. Crisis preparedness requires a plan, and a detailed one. Pressures that arise during […]

Doug Bedell — June 24, 2013, 12:09 pm

Penknives a Misplaced Airport Security Item

The Transportation Security Administration (TSA) is being forced by misplaced public opinion to keep penknives on its list of items banned at airport checkpoints, says the Defense Media Network. Being on-the-lookout for an item as relatively harmless as a penknife can distract officers from spotting increasingly ingenious smuggling methods, like sneaking explosives through security systems. […]

Doug Bedell — June 21, 2013, 6:23 am

DHS Advises On Intellectual Property Security

Maybe you didn’t know that the Homeland Security Department is concerned about intellectual property theft. Yes, it’s one of a number of federal agencies that are seeking to enhance U.S. innovation and direct its benefits here, not elsewhere. Homeland Security Secretary Janet Napolitano  writes here about  the 2013 Intellectual Property Enforcement Coordinator Joint Strategic Plan. […]

Doug Bedell — June 19, 2013, 7:38 am

Infographic Helps Explain Security Cameras

Here’s an infographic from 2M CCTV, an online cctv cameras retailer, that handily explains aspects of a camera’s operation – from lenses to angle of view – important information in selecting a camera system to meet your surveillance needs. You already know that a security camera is not simply a Kodak on stilts. A few […]

Doug Bedell — June 17, 2013, 10:50 am

Where Are We in a Surveillance World? Right Where We’ve Been

Ronald Marks on Security Debrief raises an interesting, if not anxious, question in the wake of the National Security Agency’s monitoring of telephone records as an anti-terrorism tactic. A key subhead: “The New Reality – You Are Never Alone in Cyberspace.” “The problem with roller coaster rides,” Marks writes,  “is you get off where you […]

Doug Bedell — June 14, 2013, 9:37 am

What ‘Briefs’ Does For You, and Why

It’s a whirlwind world. And, with the Web so much in the picture, getting caught up in the flow from a myriad of sites risks missing some of what’s really important. For instance, have you heard that America’s drinking and wastewater systems rate a “D” on the nation’s infrastructure report card, as compiled by the […]

Doug Bedell — June 12, 2013, 4:40 pm

Justice Dept. Issues Guidance on Planning Large-Scale Events

If you know anyone who’s responsible for planning the security aspects of a large-scale event, you might want to reference the U.S. Justice Department’s just-released guidance for law enforcement and local governments on planning and managing such events. Government Security News advises that “the guidance includes three documents synthesizing best practices relating to security planning. They […]

Doug Bedell — June 10, 2013, 10:04 am

Thermal Cameras – Elements in Perimeter Security

Thermal cameras, effective in both night and daytime conditions, can be important elements in protecting extensive site perimeters. Here, on the SightLogix blog, is an introduction to their role. “Because smart thermal cameras ‘see’ heat rather than light,” SightLogix explains, “they are a perfect ‘human detector,’ and will ignore headlights, reflections off water, or other […]

Doug Bedell — June 7, 2013, 11:49 am

Cyber Protection: Passwords as Encrypted Sentences

Bruce Schneier contributes advice on creating security passwords that will be hard to crack. Coming up with staunch passwords is  becoming harder as lists of commonly used password sequences grow. So, Schneier returns to advice he provided in 2008 – turn sentences into passwords. “Something like ‘This little piggy went to market,’” he demonstrates, “might […]