Resource Blogs

Most Recent Blog List for Blog Category: State of the Industry

Security Specifier Blog List Image for Global State of Information Security

Global State of Information Security

From April 4, 2016 to June 3, 2016, PricewaterhouseCoopers (PWC), and CXO Media (publications CIO, and CSO) conducted “The Global State of Information Security Survey 2017. While clearly meant for the IT sector, I found several areas of interest to the broader security market.
read more -->

Security Specifier Blog List Image for The State of Security Video Analytics

The State of Security Video Analytics

Examines the current state of video analytics technology & considerations for modern deployment.
read more -->

Security Specifier Blog List Image for Big Data and Privacy for Physical Security

Big Data and Privacy for Physical Security

Examines the business expectations regarding big data supported security technology including privacy.
read more -->

Security Specifier Blog List Image for Converging on Convergence

Converging on Convergence

If the end point for where the explosion of network devices and available data is what we are coming to know as big data, it's useful to think about 'convergence' as a journey to that end. So the beginning of this journey today is from a position I'll call 'little data', or the information from a closed security system - cameras, some storage, video management, and often a tie into access control, loosely or tightly integrated.
read more -->

Security Specifier Blog List Image for The Challenge of an Emerging “Quicksilver”Security Environment

The Challenge of an Emerging “Quicksilver”Security Environment

What is going on with security and consulting that is significantly different than the decades in the years past? What I have experienced in the last 5 years is Physical Security Quicksilver. (Quicksilver - rapid or unpredictable in movement or change”.) The industry used to describe this movement as convergence; however it is more than that now. In many ways the technologies have already converged. Consequently this raises more questions than answers for the security technologist consulting within this moving target.
read more -->

Security Specifier Blog List Image for Notes on the Security Consultant of Tomorrow

Notes on the Security Consultant of Tomorrow

Two key factors have permanently changed the landscape in which a security design consultant works. This doesn't alter the basic purpose of a security design consultant, but it drastically changes the mindset required to be one in several important ways.
read more -->

Security Specifier Blog List Image for The Next Generation Security Consultant

The Next Generation Security Consultant

‘The more things change, the more they stay the same’, an opinion that we’re all familiar with and while applicable to many aspects of our professional lives, is totally erroneous and misleading when applied to the ever evolving professional security consultant community. Future security consultants will have to proactively prepare for their careers through education and experience. In the academic world ‘publish or perish’ is still valid, but in our profession it could easily be ‘re-educate or retire’.
read more -->

Security Specifier Blog List Image for NextGen Security Consultant

NextGen Security Consultant

As the future evolves, what must an effective security consultant be able to achieve? Admittedly, the answer must include an understanding of the world as it is and as it is emerging. What might the future present for issues involving security? There are several aspects to explore:
• How and where we live and work in terms of the physical space;
• the social norms and attitudes;
• technology in terms of communication and the associated protocols;
• and the ability to create physical barriers and the tools associated with their operation.

read more -->

Security Specifier Blog List Image for What will the next generation of security consultant look like?

What will the next generation of security consultant look like?

As the prevailing threats to safety and security and mitigating technologies have adapted over time, so too has the role and requisite skill set of the security consultant. Systems have gotten smarter. Protocols have been standardized. Transmission media are shared. On one hand, this technological progression has provided us with amazing tools for increasing safety and security.
read more -->

Security Specifier Blog List Image for Making Sense of Convergence

Making Sense of Convergence

Much has been written over these past few years on the topic of convergence, and I would guess that, if you were to ask ten people in the security industry what convergence means, you’d get a like number of differing answers. So, when I sat down to write about technologies driving convergence, I really wanted to start off with a clear statement of what’s being driven and why.
I prefer to take the broad view and look at convergence as the blending and sharing of information across the enterprise for the greater good, enabled in large part by network technology and permitted, if not promoted, by the various stakeholders. This is not just about IT and security, or putting security on the corporate network — it embraces any department or system whose information can interact, inter-relate or affect the business.
read more -->

Security Specifier Blog List Image for IT companies should be leading the way in training

IT companies should be leading the way in training

A topic that has gained significant attention in this industry has been that of training and certifying those who design, sell and install IP-based physical security solutions. In my opinion, IT companies have largely missed the boat on this issue. Where they have had the opportunity to take the industry by the hand to lead it to the IP Promised Land, they have instead relied on already-established programs, providers and certifications targeted at the IT professional. Thus, the industry’s migration to this technology is happening in a disorganized, unstructured manner, with many left wondering the proper path for learning and skills validation.
read more -->


Copyright Ⓒ 2010 SecuritySpecifiers™
>