Online Training Program For PSNA Certification Launches 

The first in a series of five new courses for security and IT professionals engaged in IP networking and security integration that leads to certification as a Physical Security Network Associate (PSNA) are now available online. The launch of the PSNA Certification Online Training program was announced by Connie Moorhead, president of The CMOOR Group, a developer of security industry online training and educational programs.
"These are the only online courses that offer dedicated training to support IP networking and convergence models," Moorhead says. "There is an incredible need for this information now and especially as the industry integrates this technology over the next ten years." ...

Cyber-Threats Outpace Security Measures 

Despite the increase in government compliance requirements and the proliferation of security tools, companies continue to underestimate the threat from phishing, data loss and other cyber vulnerabilities, says McAfee CEO David DeWalt.
In a keynote address at the InformationWeek 500 conference in Tucson, and reported in Information Week, DeWalt said, "It's amazing how low the awareness is of cyber-security threats," among both government officials and corporate executives. "As the world has flattened, we've seen a significant amount of emerging threats from increasingly sophisticated groups attacking organizations around the world."...

Annual Theft Survey Shows Rise In Employee Theft 

According to 19th Annual Theft Survey by Jack L. Hayes International, Fruitland Park, Fla., loss prevention and inventory shrinkage control consulting firm, there were more than 530,000 shoplifters and dishonest employees apprehended and more than $116 million was recovered from those thieves by just 23 major retailers in 2006.
Shoplifters and dishonest employees stole more than $6 billion in 2006 from these 23 major retailers.
"This is only the second time in the past nine years where both the apprehensions and recovery dollars from shoplifters and dishonest employees has increased. Shoplifting apprehensions and recovery dollars were up 11.2 percent and 13.9 percent respectively," says Mark R. Doyle, president of Jack L. Hayes International. ...

Security Industry Association Launches Training Initiative 

The Security Industry Association (SIA) has announced the launch of a new training initiative to meet the security industry's need for timely and relevant training. SIA identified the first seven critical job roles in the security technology industry, developed a competency model to represent the skills needed to perform these jobs effectively, and built a listing of courses applicable to the needed skills -- a curriculum map.
"The mission of SIA Education is to raise the level of knowledge and professionalism in the security technology industry channel," says Richard Chace, SIA executive director and CEO....

Spotting And Stopping Today's Thieves 

By Steven May

Retail loss prevention (LP) experts have bad news for retailers when it comes to stopping today's thieves: there's no shortcut. Because today's thieves...

Hacker AT THE DOOR 

By Ashley Roe

DEF CON is widely thought to be the largest underground hacking convention in the world. The yearly convention caters to hacking enthusiasts, IT and security...

Don't Just Converge Partner 

By Robert B. Holm

I've been in a corporate security role for more than 25 years with five different Fortune 200 companies, and no matter where I've been, corporate security...

Study Reveals Insight for Mobile Wireless User Protection 

Aglobal third-party study commissioned by Cisco Systems Inc. and the National Cyber Security Alliance (NCSA) reveals behavioral findings among mobile...

Remembering The 3 Cs Can Ensure A Successful Evacuation Plan 

By John McCarthy, J.D.

Emergency situations tend to confuse and panic employees, but a carefully crafted evacuation plan can provide a degree of order and discipline to an otherwise...

Staying Alert In Parking Facilities Reduces Vulnerability 

Parking garages and lots are ranked second after residential property as locations where violent crimes are more likely to occur. Specifically, in parking...

New InfoSec Standard Launched For 2007 

The Information Security Forum (ISF) has publicly launched the 2007 version of its International Standard of Good Practice for Information Security, which...

Redefining Access Control 

We have launched a research project to gather opinions and commentary to better define the role of Access Control in today’s security systems....

Survey Shows Security Programs Missing Opportunity 

The Security Executive Council has announced the results of its June/July International Security Research Database survey and the posting of the next set of survey questions online at csoexecutivecouncil.com. Each survey's results will help expand and improve the Council's International Security Research Database, a new tool with which security professionals can measure the business value of their security operations by comparing their organization to others across the globe.
The June/July survey provided interesting insights into the frequency of workplace violence incidents and methods of gathering and reporting security-related data to management. ...

Weakest Security Link = People? 

People remain the weakest security link for financial companies, according to consultancy firm Deloitte.
The compromising of customers' systems continues to be the major cause of security breaches in financial institutions, according to the 2007 Global Financial Services Security Survey.
Business partners and third parties also represent a cause of computer security breaches, one example given being the loss of up to 48 million credit and debit card details from a well-known discount retailer....

What Are The Top 5 Most Challenging Issues in Security? 

During ASIS 2007 next week in Las Vegas, the results of a poll will unveil The Top 5 Most Challenging Issues in Security. Experts will be on hand to discuss the exclusive poll results and what they mean to today's security professionals.
The poll will be featured as part of a series of live, interactive sessions at ASIS, sponsored by Verint Systems in cooperation with Access Control & Security Systems magazine and securitysolutions.com. Experts will discuss several key issues that are shaping the future of the security industry and the lives of security professionals in the "Get Connected" series to be held at Verint's booth #1213....

Businesses Plan To Increase Spending On Network Security 

Cisco has released a set of results from an additional international study examining mobile workers' security behavior with regard to corporate security and its impact on businesses. The study reveals widespread plans to increase security spending by as much as 20 percent next year to protect expanding wireless networks and the growing numbers of mobile employees who access them.
The latest research builds on findings released earlier this month spotlighting the growing trend of mobile employees and how their security behavior can heighten risks for businesses' IT organizations as they connect to corporate networks and carry sensitive information outside office walls. While the previous findings involve more than 700 mobile employees in seven countries where wireless and mobility technologies are widely adopted, the additional recent findings reveal spending plans and business drivers for more than 700 IT decision makers who work in those same nations: the United States, United Kingdom, Germany, China, India, South Korea and Singapore....

Jericho Forum Presenting Corporate Security Blueprint At InfoSecurity Conference 

Chief information security officers from some of the world's biggest companies say the tools they've been getting out of the high-tech industry aren't good enough. They say they've been having a hard time protecting their companies and keeping them open for business on the Web.
So they banded together and founded the Jericho Forum, named after the Battle of Jericho, where the Israelites blew their trumpets and made the city walls fall down. Those walls, like many corporate security perimeters, look like "Swiss cheese," Paul Simmonds, the forum's chairman told Baseline magazine.
The Jericho Forum may become better known when it presents a blueprint for a corporate security architecture, along with guidelines for designing it, at the InfoSecurity conference in New York City, running today and tomorrow (Sept. 11 and 12) at the Jacob Javits Convention Center. ...

Take The Poll: What Are The Biggest Security Challenges You Face? 

Please take our online poll and provide valuable feedback. We will announce the results during the ASIS show in Las Vegas in a session co-sponsored by Verint Systems Inc. Click here to take the poll....

SIA Offers Networking Opportunity With Australian Delegation 

The Security Industry Association (SIA) announced it will co-host a Sept. 18 reception at the Australian Embassy in Washington, D.C. for SIA members to network with a visiting delegation of leading-edge Australian security companies. The 4:30 -- 8:00 p.m. event is available to the first 30 SIA members who register.
"SIA is continuing its efforts to present international market opportunities for our members," says Richard Chace, executive director and CEO, The Security Industry Association. "We view this networking event as the beginning of a new relationship with these companies as well as the Australian Security Industry Association."...

Survey Says Corporate Security Policies Often Not Enforced 

What keeps security administrators awake at night? It could be the latest attack, or a newly-discovered vulnerability in the systems. But according to a report by Forrester Research and RSA Security, creating a security policy is still the biggest nightmare for most chief security officers.
Sixty-two percent of respondents consider the enforcement of existing company policies to be their most pressing driver in ensuring that data is properly secured. However, controlling the rising costs of ongoing compliance with those policies is becoming a burden, and 33 percent of the respondents -- the majority response to this question -- said compliance costs are too high.
Security policy issues have been around for years -- and that's part of the problem. Fifty-five percent of respondents have data security policies that are either outdated or require significant changes to bring them in line with regulatory and company mandates, the study says....

The Initiator 

By ASHLEY ROE

OhioHealth Corp., established in 1891, consists of a family of not-for-profit, faith-based hospitals and healthcare organizations serving patients in...

The Partner 

By Randy Southerland

When it comes to security at national retailer Target Corp., Minneapolis, the best approach is one of partnership. Working closely with others - whether...

The IP Protector 

By Randy Southerland

Protecting the people and assets of a worldwide technology company requires integration and coordination across both distances and departments. For Steven...

The Trainer 

By Ashley Roe

As the director of safety and security for Broadway House for Continuing Care (BHCC), Nicholas Nilio believes that every BHCC employee contributes to...

Blended Threats, Unified Response 

By Sandra Kay Miller

Despite the sage advice not to put all your eggs in one basket, a recent study found that 43 percent of companies rely on a single strategic vendor for...

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | Next

Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top