Smile for entry
by Amy Canfield | August 27, 2013 | securitydirectornews.com/
NEW YORK—Many of the 4,000 residents of the historic Knickerbocker Village apartments in Manhattan have tossed out their access cards. Soon all of them will, because the only thing they’ll need to enter the 12-building, 1,600-unit complex is their face. No more keys, no more access codes.
Data Security Begins With the Traveler
by Joe Sharkey | September 2, 2013 | nytimes.com
MY wife looked up from her iPad, where she was routinely reviewing a credit card statement.
Senior management do not understand security metrics as it is too technical
by SC Staff | July 11, 2013 | scmagazineuk.com
Half of IT professionals do not believe that their metrics adequately convey the effectiveness of security risk management efforts to senior executives.
Physical Security Experts Must Understand Cybersecurity
by Colin Bodbyl | July 28, 2013 | ifsecglobal.com
Most physical security experts have not known much about cybersecurity. However, as physical security continues to merge with the IP world, cybersecurity training should be on the agenda for each and every one of us.
How CIOs Should Talk to the Board About Security
by Deloitte | July 24, 2013 | wsj.com
The surge in high-profile data breaches and cyberattacks that have occurred over the past five years has prompted many corporate boards to begin asking pointed questions about their companies’ information security practices. They want to know: What are the odds our company will experience a damaging security breach, and what are we doing to prevent that from happening?
Security ROI: 5 Practices Analyzed
by Larry Ponemon | June 19, 2013 | informationweek.com
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.
Employee Theft On the Rise and Expected to Get Worse
by Chad Brooks | June 19, 2013 | businessnewsdaily.com
Poor pre-employment screening and a decline in supervision are contributing to the rise in employee theft incidents, new research shows.
6 Steps to Secure Mobile Devices
by Eric Chabrow | June 25, 2013 | govinfosecurity.com
NIST's Revised Mobile Guidance Gets New Name for New Times