Welcome To Security Solutions

Latest issue of Security Solutions out now! Security Solutions is a leading security resource for business, government and the security industry. Through Security Solutions, readers enjoy access to information from leading experts on issues such as terrorism, operational security matters, technological developments, risk management and IT security as well as the latest news on security events. As a busy security … [Read more...]

Structuring for the future – strategic thinking for a secure Australia

The intent of Safeguarding Australia 2018 The diversity, increase and damage from terrorist attacks, the growth of cyber enabled espionage and criminality and the increasing concerns about foreign interference create a contemporary threat environment which calls for the need to rapidly coordinate interagency efforts to meet risks to the public. Across the public and private sectors of Security and Emergency Management, … [Read more...]

New Appointments Boost Hills Capacity for Enterprise Projects

6 October 2017 Hills has announced the appointment of Jourdan Garde as General Manager, Growth Markets Security, Surveillance and IT, for Australia and New Zealand. Based in Hills Port Melbourne office, Garde will be responsible for further expanding the company’s presence in the enterprise security market and developing sales opportunities with channel partners as part of a strategy to cultivate big ticket … [Read more...]

Red Teams Too Close to See

by Don Williams Is it possible to be too close to something? To be so familiar with the situation that the view has become ordinary? I once asked the then security manager of Sydney Opera House, as we stepped out onto the forecourt with the sun sparkling off the wakes of the ferries, the Bridge towering off to one side and the Botanic Gardens lush on the other, if they ever forgot where they worked. The answer was “yes, … [Read more...]

Structuring Your Business To Protect Your Assets

By Justin Lawrence Many people own their own businesses, and this is a mistake. At this point, you are probably asking yourself what I’m talking about. People should not own businesses in their personal capacities. Businesses should be owned not by the proprietors of them, but by other people or entities who are separated from the day-to-day operation of the business. But how do business owners structure themselves … [Read more...]

Put Your Prices Up?

By David Gregory Pricing is often deemed as a black art. It creates fear in the hearts of business owners and a sense that it alone will decide on the success of their business. The reality can be quite different. I recently met with a business that told me he had “never” put up his prices for existing customers. His belief was that he would lose the customer, if they had to pay more. When quizzed on his customer base, … [Read more...]

What Is A Risk Assessment Context?

By Dr Kevin J. Foster Security professionals are often required to conduct risk assessments. Sometimes the security risk assessor might focus on vulnerabilities that he or she notices in his or her employer’s facility or operations. For example, if the risk assessor has an electronics background, he might make quite a few suggestions about how to improve access control systems, intrusion alarms and CCTV. Of course, it … [Read more...]

Top 10 Cyber Security Information Sources

There can be no doubt that cybersecurity is one of the hottest topics in the security world right now. In fact, it is one of the hottest topics around – period. However, for the average physical security practitioner, staying informed about cybersecurity trends, practices and technologies can be challenging to say the least; especially in a world where information overload, a lack of time and an expectation that people … [Read more...]

Sting Long-Life Rechargable GPS Tracker

Compact with Light, Temperature & Humidity Sensors The Sting is an ultra-compact, rechargeable GPS tracking device. The light, temperature and humidity sensors set it apart from other battery powered trackers. It has been designed to track high value parcels, cargo, cash in transit, personnel, and other assets where super-long battery life is required without sacrificing the frequency of updates and … [Read more...]

The New Mass Gathering Security Reality

By Craig Harwood How does security counter the terrorist threat at places of mass gathering? That IS the question, is it not? Firstly, it is flawed thinking if one believes by countering that the threat is negated in its entirety. Insidious, callous, cowardly and suicidal attacks by their nature are extremely difficult to thwart. When an offender is willing to die in the execution phase of his attack at any stage, … [Read more...]

Keeping Pace With The Global Retail Supply Chain – Part 1

By Jac Brittain The role of loss prevention across the retail supply chain security program continues to expand. The retail supply chain network is a critical component of the retail machine. While many may view the heart of retail as the interactions and events that happen within the store, this support system has always fuelled the way. Through a complex web of processes and activity, a well-managed supply chain … [Read more...]

Pro Bono U2

By Don Williams Pro Bono does not mean being a fan of the group U2. Rather, it is pro bono publico – for the public good – basically Latin for you are not getting paid. Why would people do unpaid work? There are a number of reasons – the main one being that without volunteers little would actually happen, particularly in the security field. All of the security industry and professional associations are run by … [Read more...]

ATTENTION INTEGRATORS: Migrating Your Customers to Gold Class Mobile Access Has Never Been Easier!

From smart phones to smart watches, leveraging mobile technology for door access and gates, as well as networks and other applications, is an obvious progression for a contemporary company. Now ISCS is offering new and existing customers and integrators the option to install one free HID Mobile Access Reader for up to five users. Managing director Stuart Harmer said the limited-time promotion would allow end users … [Read more...]

Hikvision Launches World’s First Ever ‘Deep Learning’ Embedded NVR

The DeepinMind embedded NVR took inspiration from human brain to perform astonishingly accurate false alarm filter August 30, 2017—Hikvision, the world’s leading supplier of video surveillance products and solutions, has launched its ‘DeepinMind Network Video Recorder (NVR)’—the world’s first embedded NVR benefiting from ‘Deep Learning’ functionality. This intelligent NVR effectively ‘learns’ to identify people … [Read more...]

Beware The Power Of The Google Search

By Justin Lawrence Google has become an incredibly effective research tool for business. It allows businesses to uncover information about current or prospective employees, suppliers and contractors that would have simply been unavailable several years ago. As employers are routinely using Google to do instantaneous background searches of prospective (and current) employees, the tide is also turning in the other … [Read more...]

Is It ‘Legal’ To Design Security Systems Without A Licence? A Risk Management Perspective

By Dr Kevin J. Foster Recently, I heard an argument from a licensed security consultant that, in a legal sense, an engineer in Victoria cannot design electronic security systems for a project in Western Australia (WA) unless he or she is licensed in WA. I have heard similar arguments previously; for example, that someone in Canberra cannot work on a security project in Queensland unless they are licensed in Queensland … [Read more...]

Beware the Women of ISIS: There Are Many, and They May Be More Dangerous Than the Men​

  ICSVE is proud to announce our new report by Anne Speckhard, Ph.D. & Ardian Shajkovci, Ph.d. released August 21, 2017 in the Daily Beast "This report from the International Center for the Study of Violent Extremism raises frightening questions about women returning from the ‘caliphate’—if they can return at all. Editor’s Note: As police tracked down the members of the cell … [Read more...]