Commercial building and facilities management resources for corporate facility executives, building operators and facility managers in all industry and service sectors. Cyber Security articles below.
This latest advancement in key-centric access control offers AES-256 encryption between lock and key.
To protect facilities, physical security and cybersecurity are increasingly intertwined.
Nearly a quarter of global organizations were hit by seven or more cyber attacks in 2020, according to Trend Micro's Cyber Risk Index.
In the past, security systems comprised of solutions from multiple vendors may have been an attractive option. Today, end-to-end solutions from a single provider offer many benefits over that model.
Netwrix reveals the top five cybersecurity trends for organizations to keep an eye on in the second half of 2020 and beyond.
In today’s workplace, be it on location or remote, the identity should define where we can go, what we can do, and what we can log in to. Learn how to unify identity management across both cyber and physical access in one place for maximum efficiency.
The February 2020 issue introduces this year's Facility Executive of the Year. Plus, a look at building envelope issues, workplace redesign, and energy metering.
An open architecture model is the lynchpin for adopting the latest technologies in access control to meet the changing requirements facility executives face. A talk with Mercury Security President, Matt Barnette, elaborates on the company’s innovations as well as industry trends.
STANLEY technology specialists deliver customized, intelligent automation solutions to resolve security vulnerabilities in near real time
In the age of smart buildings, the realm of operational technology needs cyber security equal to those employed for IT systems.
The proposed facility certification would be a natural extension of the ISASecure® program.
The HD Ultra camera range comes in three form factors with a variety of mounting options: the HD Minidome, HD Bullet, and an HD PTZ Pendant.
Security teams are understaffed as cyber security skills gap worsens, according to a new Tripwire survey.
Lack of cyber talent, budget, and operational alignment are top challenges, according to a new report from Deloitte.
Half of business leaders say a data breach could end their business, according to a new survey by AppRiver.
The founder of non-profit Cyber Education Foundation asserts that cybersecurity is not one person’s job; rather it should be ingrained in a corporate culture.
CFUM provides capability across a distributed geography to automatically update firmware on camera devices from one or more vendors.
HID ActivOne is an end-to-end digital ID management and authentication solution for large organizations, securing the identity of people, critical data, and assets with the flexibility of a subscription.
What does adding a digital layer to traditional security look like? And, what is the future shaping up to be for security in the built environment?
SecuriThings delivers real-time security for cloud-connected IoT applications.
According to the fourth annual Business Owner Survey from Nationwide, U.S. small and mid-sized businesses are less concerned with cyber attacks although the threats remain ever-present.
In a new study from ObserveIT, the majority of respondents understand the definition of an insider threat, but data shows the risk of insider threats is growing rapidly.
Through an exclusive partnership, these two firms are focused on protecting the networks and technologies that make commercial buildings smart and cyber secure.
The company's underwriting platform utilizes tens of thousands of data points to assess the risk surface of a smart building, including a review of exposed Internet-connected IoT devices.
The study, conducted by Ponemon Institute and sponsored by IBM Resilient, found that 77% of respondents state they do not have a formal cyber security incident response plan applied consistently across their organizations.
MR Series 3 Serial Input/Output (SIO) modules extend integration capabilities, enhance cyber security, and provide seamless upgrades for existing Mercury-based deployments.
HID Global Seos credential technology is now embedded in NXP’s SmartMX-based secure element devices.
With Internet of Things technology in place, facility maintenance decisions are made easier and more efficient.
Cyber security, workforce planning, immigration, medical marijuana, the Affordable Care Act also among the big challenges facing employers in 2018, according to a new XpertHR survey.
Regardless of the size of your organization, it's wise to proactively take steps to secure it from the financial and reputational damage cyber attacks can cause.
Life safety and electronic physical security systems can now be assessed for cyber risk against industry-specific requirements.
Even with protocols in place to prevent cyber attacks, enforcement by management can be lax, according to new survey from Clutch.
KPMG's 2017 Cyber Healthcare & Life Sciences survey found an increase in the percentage of respondents that were victims of a data breach at healthcare providers and health plans.
In this second installment, the pathways through which digital convergence enables new possibilities for workplace management leaders is discussed.
Nearly 3 billion customer data records expected to be stolen in 2017, according to a new report by Juniper Research.
The 2017 FM Global Resilience Index from commercial property insurer FM Global probes business vulnerabilities in nearly 130 nations.
A two-year study by IBM and Ponemon shows a decline in cyber resilience in 2016: 66 percent aren’t confident in their ability to recover from cyberattacks.
The company offers advisories through its Cyber Protection Program that employs a holistic approach to cyber security for physical security products.
A newly released document from AT&T on navigating this threat landscape asserts that most cyberattacks currently impacting businesses are "known" or common threats.
Four out of 10 companies have suffered a loss of key corporate data from a mobile device.