Archives: February, 2016

Doug Bedell — February 29, 2016, 12:56 pm

Beyond a Barrier, Tips For Insuring Site Security

The Intersec blog has a helpful post on “Top 10 Tips for Perimeter Security,” ranging from deterring intruders in the first place to gathering evidence and auditing what occurred should they try for a breach anyway. Site security is a process, not only a deterrent like a reliable barrier. A post like this one will […]

Doug Bedell — February 24, 2016, 12:29 pm

Authoritative Reflections on Drones for Security

While dependable vehicle access barriers will always be needed, there’s a growing perception that aerial drones will be an important site security device as well. But drones can thwart security as well as enhance it. On In Homeland Security, Air Force Lt. Col. Mike Fowler begins a five-part, peer-reviewed series on “The Future of Unmanned […]

Doug Bedell — February 22, 2016, 8:14 am

Security Via the ‘Samurai Code’

All the security posting we’ve done on Barrier Briefs over the years has been about physical security. We can’t recall touching upon people skills and teamwork. So now’s the time for Security magazine’s “Learning Security Management from the Samurai”. “Without good people, teamwork, and respected supervisors and managers, technology is worthless,” Frank Kerns writes. The […]

Doug Bedell — February 17, 2016, 1:05 pm

Terrorism, Immigration Aren’t Linked, Study Finds

The In Homeland Security blog notes that “there’s no real link between immigration and terrorism,” according to a study – “Does Immigration Induce Terrorism?” – in the University of Chicago’s Journal of Politics. “When migrants move from one country to another, they carry skills, knowledge and perspectives, which stimulate technological innovation, the diffusion of new […]

Doug Bedell — February 15, 2016, 12:26 pm

Retail Security: Shift to Chip Card Readers Going Slowly

In one way, this is a reach from perimeter security, but in another, it’s where our world is in terms of secure transactions, so it’s good to know about. That’s EMV we’re talking about – EuroPay, MasterCard and Visa payments via credit card chips. The change to chip card usage has been going slowly – […]

Doug Bedell — February 12, 2016, 1:18 pm

Hazards of Email ‘Phishing’ – Know the Dangers

The Security Metrics blog provides a tutorial on “Phishing Email Scams,” a means of telling which emails are legitimate, if not entirely welcome, and those which are merely malware. Obviously, it’s important to know the difference. But how many of us really do? Here’s what can happen when we don’t: “Some phishing emails will have […]

Doug Bedell — February 10, 2016, 11:13 am

Security Climate Still Poor As 2016 Advances

The U.S. security climate evidently isn’t getting any better. A post on In Homeland Security advises that “six terror-related arrests in five different states have already occurred in 2016.” “The Islamist terror threat remains alarmingly high as recent arrests and terror plots demonstrate. ISIS recruits wage war in our communities, while thousands of deadly fighters […]

Doug Bedell — February 8, 2016, 12:38 pm

Mikko Hypponen, Virus Hunter

  Here’s something of what we’re up against in defending computer security. Safe & Savvy presents a year-by-year “rogues gallery” of computer viruses as selected by Mikko Hypponen, “one of the world’s most prominent cyber security experts.” Hypponen “has spent nearly 25 years with F-Secure protecting people from computer viruses, worms, trojans, and other types […]

Doug Bedell — February 5, 2016, 11:53 am

Super Bowl Getting Tightest Sporting Security Ever

Super Bowl 50 this Sunday in Santa Clara, CA, will be “the most highly guarded sporting event in U.S. history,” In Homeland Security reports. “An estimated 1 million football fans will descend upon the San Francisco Bay Area this weekend,” In Homeland Security advises, “in addition to the millions of people who already live there. […]

Doug Bedell — February 3, 2016, 1:04 pm

Army Seeking Effective Drone Defense

The U.S. Army is taking the threat of attacks by drones seriously enough to look for a system to defend against them. That means, possibly, that down the road operators of other large-perimeter sites may also be checking out drone defense too. So far, reports that the leading candidate appears to be the DroneDefender, […]