• image
  • image
  • image
  • image
  • image
  • image

4 Hurdles To Securing The Internet Of Things

by Kelly Jackson Higgins | September 4, 2014 | darkreading.com

Security is hard enough to master in the traditional enterprise network. Now add all types of devices on the Internet of Things, great (think cars) and small (think webcams and baby monitors), which were never built with cyber security in mind.

Read more: 4 Hurdles To Securing The Internet Of Things

Tor, a Service for Protecting Identity, Says Network Breached

by Danny Yadron | July 30, 2014 | blogs.wsj.com

Tor, a service used to cloak the identity of Internet users, says outsiders breached its network and tried to learn the identities of some users earlier this year.

Read more: Tor, a Service for Protecting Identity, Says Network Breached

Making a Cultural Shift

by Staff | August 1, 2014 | security-today.com

Hospitals operate 24/7. As a result, countless numbers of people enter and exit their facilities. In order to provide a safe environment for their patients and employees, they need to know who these people are and why they are there.

Read more: Making a Cultural Shift

Security Becoming Less of a Luxury

by Michael Gips | August 1, 2014 | securitymanagement.com

There’s a well-known Monty Python sketch in which four successful Yorkshiremen compete to prove that they suffered the most humble upbringing. When one of the four boasts of growing up in a tiny tumbledown house with holes in the roof, another counters that his whole family lived packed in a single room.

Read more: Security Becoming Less of a Luxury

School security plans should prepare students to expect the unexpected

by Patrick Fiel, Sr. | April 23, 2014 | securityinfowatch.com

School administrators have long feared an active shooter on campus. Now, they also have to consider and plan for the active slasher. Earlier this month, a high school sophomore armed with two large kitchen knives entered Franklin High School in suburban Pittsburgh and began stabbing and slashing students in crowded hallways. Before he was detained, 19 students and a security guard were injured.

Read more: School security plans should prepare students to expect the unexpected

Doctor's sex assault case spurs talk of background checks

by Scott Dance | June 14, 2014 | baltimoresun.com

Lawmakers concerned that Dando rape conviction was missed by licensing board. Revelations that a former Catonsville doctor obtained his Maryland medical license despite having a rape conviction on his record is sparking a push for criminal background checks of physicians — a proposal that has failed and been ignored in recent years.

Read more: Doctor's sex assault case spurs talk of background checks

LP gets bigger ROI when aligning with operations, finance

by Amy Canfield | June 16, 2014 | securitydirectornews.com

OTTAWA, Ontario—Total Wine & More, the nation’s largest retailer of fine wine, is using its video surveillance to capture essential data when packaging bottles that can retail for up to $2,000 a piece.

Read more: LP gets bigger ROI when aligning with operations, finance

Social media gives terrorist new tools, not just wider audience

by Zach Rausnitz | May 22, 2014 | fiercehomelandsecurity.com

Facebook, Twitter, YouTube and other social media platforms enable terrorist groups not only to reach a wider audience but to execute new strategies for propaganda and recruitment, says a report published by the Wilson Center.

Read more: Social media gives terrorist new tools, not just wider audience