off

Blocking DDoS Attacks: Cutting Down on Response Times Using Automation

Distributed Denial of Service (DDoS) attacks can be catastrophic, but the right knowledge and tactics will drastically improve the host organisation’s chances of successfully mitigating such episodes. Here, Adrian Taylor explores the five ways in which automation can...
Posted On 10 Jul 2019
off

Enterprise Security Risk Management: A Security Programme Maturity Model

As one of its stated strategic initiatives, ASIS International has been actively involved in promoting the adoption of Enterprise Security Risk Management (ESRM). ESRM is a strategic security programme management approach that ties an organisation’s security practice to its...
Posted On 05 Jul 2019
off

Managing Insider Threats: Why Context is Critical

The subject of ‘The Insider Threat’ is fast rising up on the corporate agenda. While you might think a company’s own employees would be less likely to pose security risks than external attackers, a recent analysis by Computing has found that this type of threat was a...
Posted On 04 Jul 2019
off

Making The Grade: The Difference Between Grade 4 and Grade 5 of BS 8607

For the benefit of Risk Xtra’s readers, Craig Birch outlines what the new Grade 5 for BS 8607 (focused on Mechanically Operated Push-Button Locksets) includes, why it has been introduced and the benefits that it can help deliver for host organisations. At present,...
Posted On 26 Jun 2019
off

Saving Time, Saving Money: A Risk-Based Approach Towards Cyber Security

If you’ve glanced at the opinion columns of security industry publications of late, you’ve probably seen the term ‘risk-based’ floating around, as in ‘the time is now for a comprehensive, risk-based approach’ or ‘a risk-based approach to security is...
Posted On 23 Jun 2019
off

Be Prepared and Plan for the Worst: How to Communicate in a Crisis

Be prepared and plan for the worst. That’s the maxim for managing communications in a crisis, as indeed it is for all contingency planning. For its part, security communications planning is a strategy designed to help management make better decisions. Only preparation and...
Posted On 12 Jun 2019
off

The Insurance ‘Win-Win’: Assessing The Benefits of Water Leak Detection

The latest figures issued by the Association of British Insurers (ABI) outline that ‘escape of water’-focused insurance claims pertaining to commercial and domestic property are costing insurers no less than £2.5 million every day. Across a four-year period, this...
Posted On 12 Jun 2019
off

Cloud-Based Access Control: Improving Security in More Ways Than One

Access control has always been at the forefront of building security. Traditionally, access control systems have come in the form of conventional lock and key methods, electronic systems or a combination of the two. Today, cloud-based systems are changing the market landscape,...
Posted On 11 Jun 2019
off

Managing Industrial and Organisational Lockdowns

In this modern day and age we all expect to be safe while we’re at work. For their part, employers have a Duty of Care to do whatever is reasonably practicable to protect the health, safety and welfare of their employees and visitors while on their premises. The Health and...
Posted On 06 Jun 2019
off

Converged Security: The Centre of Attention

In today’s high-risk and high-threat environment, there’s a very real and immediate need for a converged security approach that actively unifies the monitoring of both physical and cyber security events through a single platform. Here, James Willison and Sarb Sembhi outline in...
Posted On 05 Jun 2019