Institute security - Expert commentary

Modernising your identity governance for today’s security challenges

These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity go...

Strengthening retail security: strategies to combat the surging shoplifting epidemic

Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023,​ where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concer...

How security gets real with remote monitoring

The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose.  Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming...

Exploring evolving trends in data security: unveiling key developments

It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data se...

3 trends to watch at GSX Conference 2023

GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise cli...

The evolving role of access control in healthcare

Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications.  From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physi...

Bridging the consumption gap: A guide for systems integrators

Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies.  Consumption...

The importance of machine authentication in plant safety and security

Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication?  Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building...

Enhancing visitor management through access control

Organisations of all types have made it a priority to better track who is coming and going inside their facilities and on their property. This can include an HVAC technician who needs to be inside a building for several hours to fix a faulty air conditioning unit or a parent who volunteers each week in their child’s school. Technology-based visitor management With considerable advancements in visitor management systems in recent years, organisations are now benefiting from technology-b...

Reinventing security integrators to weather macroeconomic headwinds

We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand c...

Multifactor authentication is now a top factor for cyber insurance eligibility and reducing premiums

Along with the growing adoption of cloud, SaaS applications have accounted for more than triple of the account-takeover attacks between 2019 and 2021, alone. Any given breach can potentially bankrupt many small businesses, with average costs reaching USD 4.35 million in 2022, according to a 2022 IBM report. Every business, no matter its size, must minimise these risks by deploying a range of cybersecurity tools and procedures. One of the most important elements is multifactor authentication (MF...

Why safeguarding charging stations is critical to the safety of the population as a whole?

The promise of electric vehicles is closer to reality than ever before. New plans and investments at the federal level designate billions of dollars to move our country toward clean energy, including $2 million to help auto manufacturers retool facilities to increase EV production. Additionally, the Biden Administration has announced a goal to create 100% carbon-free electricity by 2035 and a net-zero carbon economy by 2050. Domestic EV marketplace The domestic EV marketplace has grown from...

DevSecOps is a ‘business priority’

DevSecOps is a vital strategy with automated security included in every phase of software development. Implementing DevSecOps means application and infrastructure security becomes a shared responsibility amongst the development, operations, and security teams which maximises protection at every level of the organisation.  Investing in DevSecOps strategies According to a recent report conducted by the Neustar International Security Council (NISC), an elite group of cybersecurity professi...

Understanding and implementing integrated security

Integrated security solutions are so often recommended by security specialists, while this sounds impressive, what does it actually mean? The short answer is: combining all aspects of security in a layered approach that leaves no vulnerable points. In this article, I will unpick the meaning behind this well used phrase, exploring the key components that make up an effective integrated security solution, while also revealing my top tips when it comes to maintenance and how to specify a solution...

“The potential is enormous” - Interview with Dr. Henrik Siegle, CTO at Bosch Building Technologies

Dr. Henrik Siegle has been the CTO at Bosch Building Technologies since November 2021. In this interview, he speaks about the megatrends of energy efficiency and sustainability, and about new developments in the building technology sector. Dr. Siegle, the building industry is currently facing major challenges in the form of climate change and energy shortages. How is Bosch Building Technologies dealing with these challenges? Dr. Henrik Siegle: Energy efficiency and sustainability have long...

A beginner’s guide to smart home security

Residential burglaries and break-ins are a problem for many homeowners. The FBI estimates there were approximately 1,117,696 burglaries in 2019 in the United States, which accounted for 16.1% of property crimes. Having proper home security can not only protect your home and belongings, but it can also keep your family safe. Even if you’re new to the idea of having and using smart home security devices, it’s easy to get started. This guide will provide the information and actionable...

Want cyber insurance? Better get patching!

Managing the technology stack and known vulnerabilities is becoming a key criteria for cyber insurance pay outs. Open source software has once again made the headlines following warnings to organisations about the release of a new version of OpenSSL. Released on 1st November 2022, the new version patched vulnerabilities in version 3.0 and above of the nearly ubiquitously used cryptographic library for encrypting communications on the Internet. Remote code execution The OpenSSL Project team to...

Why insider threats will rise in 2023 (and how to fight them)

Two trends in recent years are combining to exacerbate insider threat risks at companies. First, companies continue to foster cultures of openness and collaboration that often run contrary to the needs of a security-oriented mindset. Second, the mainstreaming of hybrid work has made companies’ control over data and device usage during work more tenuous. Addressing insider threats We’ve seen repeatedly that companies have the tools, structural choices, and decision-making power acro...

Door security trends: The path forward

The outlook for advancements in door security solutions is proving to be an extension of the positive trends that have emerged over the past few years and that continue to evolve in exciting new ways. That’s a good sign as we make our way along the road toward an ever-safer world. Improvements in a hybrid workforce  Here’s what we’re seeing: More and more companies are rethinking the office space and how electronic access control (EAC) security and data can help better s...

How to prepare your security for a rapidly changing world

You’re no psychic. You probably don’t have the power of clairvoyance. But guess what? When it comes to your security, none of that matters. You can still create future-proof security by properly equipping yourself. Here’s how. Understanding access control Security is changing faster than ever before. With new threats inside the workplace and smaller security teams taking on more tasks, IT and security personnel must automate their processes using new technology. One difficu...

How to update telecom security for the 5G era

Although the wider adoption of 5G, together with faster connection speeds and improved bandwidth, opens up new prospects for telecom service providers, it also poses new risks in terms of network security. This article explains how telcos can make their newly-established 5G networks as well as telecom software solutions more impenetrable and secure. Implement robust device authentication protocols 5G is set to spur a wide-scale adoption of connected devices in the business and consumer sphere...

Why are construction sites uniquely susceptible to fuel theft?

Although inflated fuel prices have somewhat settled since the summer, recent changes in legislation mean construction sites are particularly vulnerable to attempted fuel thefts. Read on to find out what’s changed, and what’s proving effective in mitigating the threat. What are the changes? As of April, this year red diesel can no longer be used in a range of vehicles, including those in construction. That means fuel bowsers are now filled with the same white diesel available to m...

How technology addresses worker shortages in security

It’s clear that despite recent layoffs in the tech industry and general unease about the economy, there are still significant gaps in the number of jobs available and the amount of workers available to fill them. According to the Labour Department, there are 5.5 million more job openings than workers available. The physical security industry is not immune to these shortages. Last fall, Allied Universal reported being unable to fill thousands of open roles nationally while other smaller s...

Six trends at the intersection of video and AI

Although video camera technology has been around since the early 1900s, it was not until the 1980s that video started to gain traction for security and surveillance applications. The pictures generated by these initial black and white tube cameras were grainy at best, with early colour cameras providing a wonderful new source of visual data for better identification accuracy. But by today’s standards, these cameras produced images that were about as advanced as crayons and coloring books....

Innovative security: The key to business efficiency, cost savings and more

Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend: More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher...

Talking Total Cost of Ownership with True Cloud Video Surveillance

Integrators need to be well versed in Total Cost of Ownership (TCO), when discussing video surveillance options with their customers. Business leaders are looking for the best, most economical technology that will address their security needs, and they also want to avoid being blind-sided by unplanned technology operations and service costs. While most folks understand that the initial cost of a video surveillance system is not the same as the total cost of ownership, many might be surprised to...

Want the benefits of true cloud: Look beyond the cloud marketing

Many people, quite correctly, point to Salesforce.com—which launched in February of 2000—as the first example of cloud computing. In the years following, the term ‘cloud’ became so popular and was applied to so many products and service offerings, that it became almost meaningless. The result was cloud confusion in the business world and in the media. In one stark example from 2008, Oracle CEO Larry Ellison described news stories about cloud as, ‘complete gibberis...

True cloud video surveillance: Do we need cloud police?

Currently and unfortunately, there is no such thing as Cloud Police. If there were, two-thirds or more of the companies using ‘cloud’ in their advertising and documentation would be in Cloud Jail for seriously misusing the word in their marketing. The term ‘Cloud’ is over-used and misused—sometimes intentionally and knowingly, but also often in ignorance. It’s just a word—but in the context of cloud computing technology, it does have a specific meaning...

‘Your data, your choice’: Why identity management is a vital cybersecurity strategy

Every day, millions of people worldwide use their personal credentials to prove their identity and access a range of services, from databases in their workplace to the banking app on their smartphone. But while this ensures only authorised people have access to certain systems, the use of this personal data opens users up to cyber risks, primarily in the form of identity theft. On Identity Management Day, Source Security spoke to seven IT and cybersecurity experts to discuss their experiences a...

Why dual factor sensors are essential for accurate gunshot detection

Most of the assumptions you’ve made about gunshot detection could be wrong. To those security professionals who stay on top of their homework, this is probably not true, but the ‘you’ in this context is directed to the collective security industry reader that, when looking into indoor gunshot detection products, sees terms like concussive force, percussion, or shockwave and wonders if these are important differentiators – or something the marketing department decided woul...

Quick poll
Which feature is most important in a video surveillance system?