Our Blog


RESULTS FOR: Physical Security

Physical Security. Risk Mitigation. Where to Begin?

August 11, 2022 | Physical Security Risk + Compliance

Why are you operating your physical security program? What threats are you trying to protect against? What specific risks to your organization and enterprise are you trying to mitigate?

If you cannot quickly and succinctly answer these questions, you may have skipped the critical step to developing a foundation for your physical security program – conducting a Threat and Vulnerability Risk Assessment (TVRA). Basing your physical security program on the results of a formal TVRA process defines the reasoning and … Read More

Unlocked: Introduction to Data Center Security Design

June 29, 2020 | Physical Security Security Consulting

While principles of physical security are largely universal, data centers require a nuanced approach and are a great case study for security practitioners. In this blog, I will discuss basic security design for data centers and the new technologies now available to address the COVID era.

Looking ahead at commercial and industrial demands for data consumption, it is clear the data center industry will continue to thrive. Estimates on market growth average 15% year over year from 2020-2023.  Whether you … Read More

Spotting Red Flag Indicators

November 12, 2019 | Physical Security Security Consulting

According to the FBI’s Pre-Attack Behaviors of Active Shooters from 2000 to 2013, 92% of attackers who were students at the time of the attack exemplified concerning behaviors. Overall, the FBI concluded that for every active shooter event, at least one person noticed the concerning behavior, yet no action was taken; therefore, the opportunity for intervention was lost.
A number of reasons exist for why these behaviors are not reported, including fear of labeling a friend or family member
Read More

Red-Light, Green-Light – the Case for a Converged and Integrated Identity Access Management Platform

April 24, 2019 | Physical Security Security Consulting

In developing, deploying and managing physical and cyber security platforms around the globe, I often am asked about the latest lessons learned and best practices we recommend surrounding Integrated Identity Access and Identity Management (IAM). Current, traditional models for IAM do not address the vulnerabilities that have evolved throughout the security protection landscape, and corporations would be advised to take a fresh approach to their integrated IAM posture.

Traditional IAM

IAM is implemented in the corporate environment via three distinct … Read More

Combating Insider Threats from the Inside Out

January 10, 2018 | Physical Security Security Consulting

In today’s business environment, managing risk requires a good understanding of the threats which exist outside our organizations but also those that exist within. So often our focus is on keeping the bad guys out, that we sometimes forget about the risks within our own organizations. Understanding your organization’s Insider Threat risk and having some common-sense tools to mitigate it, are the first steps to developing a successful strategy.

According to the 2015 Forrester Global Security Survey, 56% of … Read More

  • 1