Welcome To Security Solutions

Latest issue of Security Solutions out now! Security Solutions is a leading security resource for business, government and the security industry. Through Security Solutions, readers enjoy access to information from leading experts on issues such as terrorism, operational security matters, technological developments, risk management and IT security as well as the latest news on security events. As a busy security … [Read more...]

Top 10 Cyber Security Information Sources

There can be no doubt that cybersecurity is one of the hottest topics in the security world right now. In fact, it is one of the hottest topics around – period. However, for the average physical security practitioner, staying informed about cybersecurity trends, practices and technologies can be challenging to say the least; especially in a world where information overload, a lack of time and an expectation that people … [Read more...]

Sting Long-Life Rechargable GPS Tracker

Compact with Light, Temperature & Humidity Sensors The Sting is an ultra-compact, rechargeable GPS tracking device. The light, temperature and humidity sensors set it apart from other battery powered trackers. It has been designed to track high value parcels, cargo, cash in transit, personnel, and other assets where super-long battery life is required without sacrificing the frequency of updates and … [Read more...]

The New Mass Gathering Security Reality

By Craig Harwood How does security counter the terrorist threat at places of mass gathering? That IS the question, is it not? Firstly, it is flawed thinking if one believes by countering that the threat is negated in its entirety. Insidious, callous, cowardly and suicidal attacks by their nature are extremely difficult to thwart. When an offender is willing to die in the execution phase of his attack at any stage, … [Read more...]

Keeping Pace With The Global Retail Supply Chain – Part 1

By Jac Brittain The role of loss prevention across the retail supply chain security program continues to expand. The retail supply chain network is a critical component of the retail machine. While many may view the heart of retail as the interactions and events that happen within the store, this support system has always fuelled the way. Through a complex web of processes and activity, a well-managed supply chain … [Read more...]

Pro Bono U2

By Don Williams Pro Bono does not mean being a fan of the group U2. Rather, it is pro bono publico – for the public good – basically Latin for you are not getting paid. Why would people do unpaid work? There are a number of reasons – the main one being that without volunteers little would actually happen, particularly in the security field. All of the security industry and professional associations are run by … [Read more...]

ATTENTION INTEGRATORS: Migrating Your Customers to Gold Class Mobile Access Has Never Been Easier!

From smart phones to smart watches, leveraging mobile technology for door access and gates, as well as networks and other applications, is an obvious progression for a contemporary company. Now ISCS is offering new and existing customers and integrators the option to install one free HID Mobile Access Reader for up to five users. Managing director Stuart Harmer said the limited-time promotion would allow end users … [Read more...]

Hikvision Launches World’s First Ever ‘Deep Learning’ Embedded NVR

The DeepinMind embedded NVR took inspiration from human brain to perform astonishingly accurate false alarm filter August 30, 2017—Hikvision, the world’s leading supplier of video surveillance products and solutions, has launched its ‘DeepinMind Network Video Recorder (NVR)’—the world’s first embedded NVR benefiting from ‘Deep Learning’ functionality. This intelligent NVR effectively ‘learns’ to identify people … [Read more...]

Beware The Power Of The Google Search

By Justin Lawrence Google has become an incredibly effective research tool for business. It allows businesses to uncover information about current or prospective employees, suppliers and contractors that would have simply been unavailable several years ago. As employers are routinely using Google to do instantaneous background searches of prospective (and current) employees, the tide is also turning in the other … [Read more...]

Is It ‘Legal’ To Design Security Systems Without A Licence? A Risk Management Perspective

By Dr Kevin J. Foster Recently, I heard an argument from a licensed security consultant that, in a legal sense, an engineer in Victoria cannot design electronic security systems for a project in Western Australia (WA) unless he or she is licensed in WA. I have heard similar arguments previously; for example, that someone in Canberra cannot work on a security project in Queensland unless they are licensed in Queensland … [Read more...]

Beware the Women of ISIS: There Are Many, and They May Be More Dangerous Than the Men​

  ICSVE is proud to announce our new report by Anne Speckhard, Ph.D. & Ardian Shajkovci, Ph.d. released August 21, 2017 in the Daily Beast "This report from the International Center for the Study of Violent Extremism raises frightening questions about women returning from the ‘caliphate’—if they can return at all. Editor’s Note: As police tracked down the members of the cell … [Read more...]

Conducting Workplace Investigations – Part 2

By Greg Byrne In this edition of the Security Solutions Magazine, I will conclude the two-part article on conducting an internal investigation. In the previous article (in Security Solutions Magazine Issue 106), I discussed that conducting an internal investigation involved a four-step process of: 1. Preparation and information collection 2. Interviewing the relevant parties 3. Making a finding and report 4. … [Read more...]

Cyber Resilience – A Decade After The First Large-Scale Attack

By Dr Rita Parker The fragility of cyber defences worldwide was exposed when malicious software (ransomware) created havoc around the globe in May this year, affecting businesses, individuals and critical infrastructure. The global reach was unprecedented. The first wave of cyberattacks hit 200,000 targets in at least 150 countries, according to a statement by the head of the European Union’s police agency Europol … [Read more...]

What Are Employees Actually Doing?

By Karissa Breen The news or the media are always reporting that outsider threats are the main source of cyberattacks, but who is actually looking at the employees on the inside? What are all these people doing? Is anyone monitoring what the system administrators are doing and ensuring they are not downloading every episode of “House of Cards” under the sun because they can and because they have ‘privileged account … [Read more...]

Leading From Below

By Jason Brown In the world of security, hierarchies are common and leadership tends to be associated with position or rank, but this need not always be the case. If you have the desire, competence and willingness to communicate your ideas you can lead from below (LfB). I would argue that in any well-run organisation, those who demonstrate a capacity to lead from below usually end up with a formal leadership … [Read more...]

The Time To Build Relationships Is Before A Disaster

By Rod Cowan A disproportionate interest in terrorism is resulting in the Government and policy makers failing in the fundamentals of national security, which must entail an all-hazards approach to security and risk mitigation. Having spent more than 14 years building relationships through the Trusted Information Sharing Network (TISN) and the Security in Government (SIG) annual conference, policy wonks scrapped the … [Read more...]

Security Leadership

By Steve Mark Security is 90 percent psychological and 10 percent physical; that is, many see security as protecting people and property from intentional harm, and doing so by focusing on, for example, physical or digital barriers. This is of course entirely appropriate; however, it only forms part of the security ‘picture’, because security also connotes the psychological state of being secure, being free from fear. As … [Read more...]