Archives: January, 2016

Doug Bedell — January 29, 2016, 9:09 am

Pointers From DHS On Maintaining Data Privacy

Yesterday was Data Privacy Day, and the Department of Homeland Security had a highly pertinent post on protecting personal and business information on the Internet. So, a day later, we’re calling your attention to it – it’s actually timeless. The last bullet point is a digital age reiteration of an eternal caution: “Think before you […]

Doug Bedell — January 27, 2016, 11:50 am

Opportunity Via the Cyber Security Act

The recently enacted Cyber Security Information Sharing Act (CISA) was prompted by legitimate concerns over computer-based information privacy. Still, notes In Homeland Security, now it’s time for issuing the implementing guidelines. And each of the federal agencies involved “must prepare to respond to each and every concern raised by the privacy mavens. Therein may lie […]

Doug Bedell — January 25, 2016, 1:33 pm

How the Security Industry’s Leadership is Changing

No industry stays the same over time in terms of its priorities and people. And security is no exception in this regard. To prove it, Security InfoWatch reports on “The changing face of the security industry.” ‘While many organizations’ executive-level security positions have historically been filled by those with law enforcement or military experience,” InfoWatch […]

Doug Bedell — January 22, 2016, 12:07 pm

Vehicle Barriers As Prime Site Protectors

The Intersec blog gives high priority to controlling vehicle access among the means of insuring a secure building site. “Even if people have easy access to your site,” Richard McKeon writes on Intersec, “controlling vehicle access can make a big contribution to minimising loss.”

Doug Bedell — January 19, 2016, 12:53 pm

Electric Fencing Can Complement Vehicle Barriers

Here’s some background on electric perimeter fencing, which can complement effective vehicle access control barriers. Actually, fencing can be the target of direct attack by would-be intruders working on foot. That makes it something to give careful attention to. Think that’s obvious? Maybe so, maybe not, as the experience, even, from police compounds suggests.

Doug Bedell — January 15, 2016, 2:47 pm

Security Managers’ Personal Pitfalls

Security managers are under a lot of pressure, but that doesn’t excuse making life difficult for others in an organization in which digital security, if not actual site security, should be everybody’s responsibility. Solutionary’s Security Insight blog discusses “The Seven Deadly Sins of Business and Information Alignment” – leading off with an inept security manager […]

Doug Bedell — January 13, 2016, 4:03 pm

‘Smart’ Homes Enhance Security, Consumers Feel

‘Smart home’ technology is spreading notably.”Nearly half (45 percent) of all Americans either currently own smart home smart home technology or plan to invest in it in 2016,” according to the real estate firm Coldwell Banker, as quoted on SecurityInfoWatch. Home security, of course, is a key concern, not just fascination with the Internet of […]

Doug Bedell — January 8, 2016, 9:52 am

Engaging Cybersecurity Predictions for 2016

Oh dear, Information Week’s Dark Reading blog has a list of the “Boldest Cybersecurity Predictions For 2016,” including “A Cyberattack Will Impact the 2016 Presidential Election”. Thought you’d had enough of lists? You need to check this one for sure-enough drama. “Forget the boring, safe predictions,” writes Ericka Chickowski, the list’s compiler “– here instead […]

Doug Bedell — January 6, 2016, 11:58 am

How Hackers Pick Their Targets

The Security Metrics blog provides a post on how hackers think – that is, find and choose their targets for intrusion on the web. “Hackers typically begin a data breach scenario,” writes blogger David Ellis, “by conducting port scans across large ranges of IP addresses, specifically looking for certain open ports that may provide them […]

Doug Bedell — January 4, 2016, 3:20 pm

Security in 2016 and Onward

Perimeter security is involved with technology – from protective fencing and vehicle access control barriers to computer-driven lighting and other protective systems. Here, to keep you reasonably current, Security InfoWatch offers “Seven astounding technology trends for 2016” to be briefed on and follow. The seven areas are The Internet of Things, Data Science and Digital […]