Search

(2017,
issue 2)
[field_writer2] BY HAMID KARIMI
A Cause for Insomnia

Imagine you are on a hospital bed attached to devices and sensors that a malintent individual across the world can digitally find and manipulate. This is a nightmare scenario. By some accounts, a typical intensive care bed has more than a dozen sensors, most of which are network connected, and at least few of them are connected to the Internet. 

(2017,
[field_writer2]

 

People living in countries where the Internet is censored will be able to use a new tool to access websites their governments restrict.

Researchers at the University of Waterloo are developing technology called Slitheen — after aliens on Doctor Who that disguise themselves as humans to evade detection.

(2016,
issue 4)
BY GREG FYFFE [field_writer2]

The Canadian Association of Security and Intelligence Studies (CASIS) recently held a Symposium entitled “The Cyber Challenge.” Although the speakers focused on the national and international, and non-criminal aspects of the threat, the implications for those on the front lines of public safety are unmistakable.

(2016,
issue 3)
[field_writer2] BY PAUL ROGERS
5 Things the C-Suite Needs to Understand

“But... We Have a Very Robust IT Cyber Security System!”

While the typical CEO, IT director, or plant manager feels quite confident that they have a security system that will keep the foxes away from their IT coop, many have no idea that there is a viper, coiled and ready to strike at their unprotected plant, grid, refinery or other critical infrastructure where they deploy Operational Technology (OT). Why? First of all, many aren’t aware that or how their control system innovations can be exploited.

(2016,
issue 1)
BY SCOTT NEWARK [field_writer2]

They’re the issues that won’t go away. First raised by FrontLine Security in 2011, following the 2010 Air India report recommendations, the issues of improving national security operational oversight and after-the-fact reviews resurfaced during the C-51 debate and the 2015 election.

(2015,
[field_writer2]

The United Kingdom's National Security Strategy provides a comprehensive basis for planning and delivering the most important responsibility of Government – protecting the country and safeguarding its people and way of life. This 2009 update documents guiding principles and a strategic framework. It outlines the why, who or what, and how these strategies will be implemented.

(2015,
[field_writer2]

(February 2010) W3C has published a report and full minutes of the Workshop on Access Control Application Scenarios, held in Luxembourg on 17th and 18th of November 2009. Participants from 17 organizations examined the current limitations of access control, privacy enhancement, distributed handling of access control, and other challenging use cases.

(2015,
[field_writer2]

(April 2007) This report discusses access control for a site, building or area, as opposed to access control for data or computer networks. Physical access control products include: audio and video entryphones; keypad entry systems; card- and token-based access-control systems (including Wiegand cards, magnetic-stripe cards, barcode cards, proximity systems, long-range/ hands-free systems, systems to control vehicle access, smart-cards and dual-function cards); and biometric systems. Some systems incorporate more than one of these technologies for added security.

(2014,
issue 2)
[field_writer2] BY ERIC SPENCE

The Aite Group has published a new research report on consumer fraud around the world. The two-part report questions confidence that consumers have in their financial institutions. The first report, which focuses on attitudes toward fraud, found that 23% of fraud victims changed financial institutions due to dissatisfaction after experiencing fraud.

Global trends

(2014,
[field_writer2] By Homeland Security Research Corporation

(July 2014) Analysts forecast a strong comeback of the X-ray security industry generating a solid 7% CAGR. The growth will be boosted by three main drivers: expansion of the Asia Pacific secured facilities and aviation security markets; the replacement of more than 40,000 outdated X-ray systems; and despite a decade of R&D aiming at new baggage, luggage, cargo and mail screening technologies, there is no modality on the horizon that can competitively challenge the cost-performance of the X-ray based screening technologies.

(2011,
issue 1)
[field_writer2] BY STEVE ALBRECHT

Ticking Bombs: Defusing Violence in the Workplace, which I co-wrote in 1994, was one of the first books published on the complex and potentially tragic Business Security issue. The centerpiece of the book featured my prison interview with Robert Mack, who in January 1992, had shot and killed the HR supervisor handling his termination from General Dynamics in San Diego, and also shot his boss (who later died from those wounds).

(2009,
[field_writer2]

(May 2009) The report covers in detail existing and evolving markets and products in the following segments: Weapons detection; Explosives detection; Multi-Threat detection including portals and standoff solutions); Biometrics; Profiling; and Behavior Tracking.

Dr. Ed Amoroso
(2008,
issue 4)
BY CLIVE ADDY [field_writer2]

Dr. Ed Amoroso, AT&T’s Chief Security Officer, with over 20 years in this field, was in Ottawa recently, speaking at a Cyber Security Conference by the ­Conference Board of Canada on Proactive Defence of Critical Systems and Information.