ºÝºÝߣshows by User: noham1887 / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: noham1887 / Fri, 24 Jun 2022 13:53:48 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: noham1887 In Risu Veritas: Humor & Security /slideshow/humor-security/252054753 inrisuveritas-220624135348-ede39675
There is often truth in humor--especially for Security.]]>

There is often truth in humor--especially for Security.]]>
Fri, 24 Jun 2022 13:53:48 GMT /slideshow/humor-security/252054753 noham1887@slideshare.net(noham1887) In Risu Veritas: Humor & Security noham1887 There is often truth in humor--especially for Security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/inrisuveritas-220624135348-ede39675-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> There is often truth in humor--especially for Security.
In Risu Veritas: Humor & Security from Roger Johnston
]]>
13 0 https://cdn.slidesharecdn.com/ss_thumbnails/inrisuveritas-220624135348-ede39675-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Journal of Physical Security 15(1) /slideshow/journal-of-physical-security-volume-151-2022/252026192 jps151-220621030908-4d874f1d
This is the June 2022 issue of the Journal of Physical Security. In addition to the usual editor’s rants and news about security, this issue has papers about ZigBee vulnerabilities, practical password cracking, humor & security, the costs of police body camera video storage, tips for reducing security guard turnover, and FDA & DHS blessing of security technologies. Back issues of the Journal can be found at http://jps.rbseurity.com]]>

This is the June 2022 issue of the Journal of Physical Security. In addition to the usual editor’s rants and news about security, this issue has papers about ZigBee vulnerabilities, practical password cracking, humor & security, the costs of police body camera video storage, tips for reducing security guard turnover, and FDA & DHS blessing of security technologies. Back issues of the Journal can be found at http://jps.rbseurity.com]]>
Tue, 21 Jun 2022 03:09:08 GMT /slideshow/journal-of-physical-security-volume-151-2022/252026192 noham1887@slideshare.net(noham1887) Journal of Physical Security 15(1) noham1887 This is the June 2022 issue of the Journal of Physical Security. In addition to the usual editor’s rants and news about security, this issue has papers about ZigBee vulnerabilities, practical password cracking, humor & security, the costs of police body camera video storage, tips for reducing security guard turnover, and FDA & DHS blessing of security technologies. Back issues of the Journal can be found at http://jps.rbseurity.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jps151-220621030908-4d874f1d-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the June 2022 issue of the Journal of Physical Security. In addition to the usual editor’s rants and news about security, this issue has papers about ZigBee vulnerabilities, practical password cracking, humor &amp; security, the costs of police body camera video storage, tips for reducing security guard turnover, and FDA &amp; DHS blessing of security technologies. Back issues of the Journal can be found at http://jps.rbseurity.com
Journal of Physical Security 15(1) from Roger Johnston
]]>
62 0 https://cdn.slidesharecdn.com/ss_thumbnails/jps151-220621030908-4d874f1d-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Audits.pdf /slideshow/security-auditspdf/251978188 securityaudits-220613220455-219baeaa
What is a good security audit, and what is not?]]>

What is a good security audit, and what is not?]]>
Mon, 13 Jun 2022 22:04:55 GMT /slideshow/security-auditspdf/251978188 noham1887@slideshare.net(noham1887) Security Audits.pdf noham1887 What is a good security audit, and what is not? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityaudits-220613220455-219baeaa-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What is a good security audit, and what is not?
Security Audits.pdf from Roger Johnston
]]>
17 0 https://cdn.slidesharecdn.com/ss_thumbnails/securityaudits-220613220455-219baeaa-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Camera Obscura and Security/Privacy /slideshow/camera-obscura-and-securityprivacy/250764632 cameraobsccuraandsecurity-privacy-211201163642
Color video can be shot with lensless off-the-shelf video cameras. There are implications for finding covert surveillance cameras.]]>

Color video can be shot with lensless off-the-shelf video cameras. There are implications for finding covert surveillance cameras.]]>
Wed, 01 Dec 2021 16:36:42 GMT /slideshow/camera-obscura-and-securityprivacy/250764632 noham1887@slideshare.net(noham1887) Camera Obscura and Security/Privacy noham1887 Color video can be shot with lensless off-the-shelf video cameras. There are implications for finding covert surveillance cameras. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cameraobsccuraandsecurity-privacy-211201163642-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Color video can be shot with lensless off-the-shelf video cameras. There are implications for finding covert surveillance cameras.
Camera Obscura and Security/Privacy from Roger Johnston
]]>
85 0 https://cdn.slidesharecdn.com/ss_thumbnails/cameraobsccuraandsecurity-privacy-211201163642-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Vulnerability Assessment: The Missing Manual for the Missing Link /noham1887/vulnerability-assessment-245861679 vabook-210407152542
Vulnerability Assessment: The Missing Manual for the Missing Link. Now available as an ebook, paperback, or hardcover. This book is written by a Vulnerability Assessor with 35+ years of experience. The book covers the common misconceptions and problems with how Security Vulnerability Assessments are thought of and done. Various security tips and advice are also offered. If you do or think about security, you need this book! ]]>

Vulnerability Assessment: The Missing Manual for the Missing Link. Now available as an ebook, paperback, or hardcover. This book is written by a Vulnerability Assessor with 35+ years of experience. The book covers the common misconceptions and problems with how Security Vulnerability Assessments are thought of and done. Various security tips and advice are also offered. If you do or think about security, you need this book! ]]>
Wed, 07 Apr 2021 15:25:42 GMT /noham1887/vulnerability-assessment-245861679 noham1887@slideshare.net(noham1887) Vulnerability Assessment: The Missing Manual for the Missing Link noham1887 Vulnerability Assessment: The Missing Manual for the Missing Link. Now available as an ebook, paperback, or hardcover. This book is written by a Vulnerability Assessor with 35+ years of experience. The book covers the common misconceptions and problems with how Security Vulnerability Assessments are thought of and done. Various security tips and advice are also offered. If you do or think about security, you need this book! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vabook-210407152542-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Vulnerability Assessment: The Missing Manual for the Missing Link. Now available as an ebook, paperback, or hardcover. This book is written by a Vulnerability Assessor with 35+ years of experience. The book covers the common misconceptions and problems with how Security Vulnerability Assessments are thought of and done. Various security tips and advice are also offered. If you do or think about security, you need this book!
Vulnerability Assessment: The Missing Manual for the Missing Link from Roger Johnston
]]>
68 0 https://cdn.slidesharecdn.com/ss_thumbnails/vabook-210407152542-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Journal of Physical Security 14(1) /slideshow/journal-of-physical-security-141-244373285/244373285 jps141-210314202121
This March 2021 issue of the Journal of Physical Security has papers on: • tax credits for physical security R&D • pinhole cameras for surreptitious surveillance • insider threat issues • tamper-indicating seals for fast food in the era of Covid • security for sealed radiological sources Back issues are available for free at https://jps.rbsekurity.com ]]>

This March 2021 issue of the Journal of Physical Security has papers on: • tax credits for physical security R&D • pinhole cameras for surreptitious surveillance • insider threat issues • tamper-indicating seals for fast food in the era of Covid • security for sealed radiological sources Back issues are available for free at https://jps.rbsekurity.com ]]>
Sun, 14 Mar 2021 20:21:21 GMT /slideshow/journal-of-physical-security-141-244373285/244373285 noham1887@slideshare.net(noham1887) Journal of Physical Security 14(1) noham1887 This March 2021 issue of the Journal of Physical Security has papers on: • tax credits for physical security R&D • pinhole cameras for surreptitious surveillance • insider threat issues • tamper-indicating seals for fast food in the era of Covid • security for sealed radiological sources Back issues are available for free at https://jps.rbsekurity.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jps141-210314202121-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This March 2021 issue of the Journal of Physical Security has papers on: • tax credits for physical security R&amp;D • pinhole cameras for surreptitious surveillance • insider threat issues • tamper-indicating seals for fast food in the era of Covid • security for sealed radiological sources Back issues are available for free at https://jps.rbsekurity.com
Journal of Physical Security 14(1) from Roger Johnston
]]>
182 0 https://cdn.slidesharecdn.com/ss_thumbnails/jps141-210314202121-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Want seals with that? /slideshow/want-seals-with-that/244308882 wantsealswiththat-210312233818
Tamper detection for fast food in the age of Covid. ]]>

Tamper detection for fast food in the age of Covid. ]]>
Fri, 12 Mar 2021 23:38:18 GMT /slideshow/want-seals-with-that/244308882 noham1887@slideshare.net(noham1887) Want seals with that? noham1887 Tamper detection for fast food in the age of Covid. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wantsealswiththat-210312233818-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Tamper detection for fast food in the age of Covid.
Want seals with that? from Roger Johnston
]]>
24 0 https://cdn.slidesharecdn.com/ss_thumbnails/wantsealswiththat-210312233818-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Journal of Physical Security 13(1) /slideshow/journal-of-physical-security-131-238732095/238732095 jps131-201004170847
This is the Oct 2020 issue with the usual security news and editor's rants, plus Viewpoint papers on Security Assurance and Election Security. Back issues are available at http://jps.rbsekurity.com]]>

This is the Oct 2020 issue with the usual security news and editor's rants, plus Viewpoint papers on Security Assurance and Election Security. Back issues are available at http://jps.rbsekurity.com]]>
Sun, 04 Oct 2020 17:08:47 GMT /slideshow/journal-of-physical-security-131-238732095/238732095 noham1887@slideshare.net(noham1887) Journal of Physical Security 13(1) noham1887 This is the Oct 2020 issue with the usual security news and editor's rants, plus Viewpoint papers on Security Assurance and Election Security. Back issues are available at http://jps.rbsekurity.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jps131-201004170847-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the Oct 2020 issue with the usual security news and editor&#39;s rants, plus Viewpoint papers on Security Assurance and Election Security. Back issues are available at http://jps.rbsekurity.com
Journal of Physical Security 13(1) from Roger Johnston
]]>
93 0 https://cdn.slidesharecdn.com/ss_thumbnails/jps131-201004170847-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Election Security 2020 /slideshow/election-security-2020/238729250 electionsecurity2020-201003222338
A highly experienced vulnerability assessor comments on 2020 election security.]]>

A highly experienced vulnerability assessor comments on 2020 election security.]]>
Sat, 03 Oct 2020 22:23:38 GMT /slideshow/election-security-2020/238729250 noham1887@slideshare.net(noham1887) Election Security 2020 noham1887 A highly experienced vulnerability assessor comments on 2020 election security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/electionsecurity2020-201003222338-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A highly experienced vulnerability assessor comments on 2020 election security.
Election Security 2020 from Roger Johnston
]]>
218 0 https://cdn.slidesharecdn.com/ss_thumbnails/electionsecurity2020-201003222338-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Assurance /slideshow/security-assurance/238729243 securityassurance2020-201003221943
Security Assurance: A dangerous idea.]]>

Security Assurance: A dangerous idea.]]>
Sat, 03 Oct 2020 22:19:43 GMT /slideshow/security-assurance/238729243 noham1887@slideshare.net(noham1887) Security Assurance noham1887 Security Assurance: A dangerous idea. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityassurance2020-201003221943-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security Assurance: A dangerous idea.
Security Assurance from Roger Johnston
]]>
200 0 https://cdn.slidesharecdn.com/ss_thumbnails/securityassurance2020-201003221943-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A New Approach to Vulnerability Assessment /slideshow/a-new-approach-to-vulnerability-assessment-238435224/238435224 vawebinars-200910034147
Most organizations don't do Vulnerability Assessment, or confuse them with something else, or do them but not very effectively, imaginatively, or proactively, thinking like the bad guys. Here is some practical advice for how to do better from a Vulnerability Assessor with 35+ years of experience.]]>

Most organizations don't do Vulnerability Assessment, or confuse them with something else, or do them but not very effectively, imaginatively, or proactively, thinking like the bad guys. Here is some practical advice for how to do better from a Vulnerability Assessor with 35+ years of experience.]]>
Thu, 10 Sep 2020 03:41:47 GMT /slideshow/a-new-approach-to-vulnerability-assessment-238435224/238435224 noham1887@slideshare.net(noham1887) A New Approach to Vulnerability Assessment noham1887 Most organizations don't do Vulnerability Assessment, or confuse them with something else, or do them but not very effectively, imaginatively, or proactively, thinking like the bad guys. Here is some practical advice for how to do better from a Vulnerability Assessor with 35+ years of experience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vawebinars-200910034147-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Most organizations don&#39;t do Vulnerability Assessment, or confuse them with something else, or do them but not very effectively, imaginatively, or proactively, thinking like the bad guys. Here is some practical advice for how to do better from a Vulnerability Assessor with 35+ years of experience.
A New Approach to Vulnerability Assessment from Roger Johnston
]]>
32 0 https://cdn.slidesharecdn.com/ss_thumbnails/vawebinars-200910034147-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Vulnerability Assessments /slideshow/understanding-vulnerability-assessments-237078751/237078751 vas-200720155206
There's a lot of confusion about the terms and concepts of "vulnerabilities" and "vulnerability assessments", much to the detriment of good security.]]>

There's a lot of confusion about the terms and concepts of "vulnerabilities" and "vulnerability assessments", much to the detriment of good security.]]>
Mon, 20 Jul 2020 15:52:06 GMT /slideshow/understanding-vulnerability-assessments-237078751/237078751 noham1887@slideshare.net(noham1887) Understanding Vulnerability Assessments noham1887 There's a lot of confusion about the terms and concepts of "vulnerabilities" and "vulnerability assessments", much to the detriment of good security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vas-200720155206-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> There&#39;s a lot of confusion about the terms and concepts of &quot;vulnerabilities&quot; and &quot;vulnerability assessments&quot;, much to the detriment of good security.
Understanding Vulnerability Assessments from Roger Johnston
]]>
38 0 https://cdn.slidesharecdn.com/ss_thumbnails/vas-200720155206-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Devil's Dictionary of Security Terms /slideshow/devils-dictionary-of-security-terms-may-2017-237052980/237052980 devilsdictionary-200719191407
A satirical dictionary of security terms that tells you what common security terms REALLY mean. The truth will set you free, but it is not pretty.]]>

A satirical dictionary of security terms that tells you what common security terms REALLY mean. The truth will set you free, but it is not pretty.]]>
Sun, 19 Jul 2020 19:14:07 GMT /slideshow/devils-dictionary-of-security-terms-may-2017-237052980/237052980 noham1887@slideshare.net(noham1887) Devil's Dictionary of Security Terms noham1887 A satirical dictionary of security terms that tells you what common security terms REALLY mean. The truth will set you free, but it is not pretty. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/devilsdictionary-200719191407-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A satirical dictionary of security terms that tells you what common security terms REALLY mean. The truth will set you free, but it is not pretty.
Devil's Dictionary of Security Terms from Roger Johnston
]]>
32 0 https://cdn.slidesharecdn.com/ss_thumbnails/devilsdictionary-200719191407-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Vulnerability Assessments /slideshow/vulnerability-ssessments/237052820 vulnerabilityassessments-200719190542
We can't test our way to good #security. Why? Because we can't test—or prevent—what we have not envisioned. (Think 9/11.) Effective, imaginative vulnerability assessments are essential. This book explains how to do them based on the 35+ years experience of a Vulnerability Assessor. This book is the missing manual for the missing link: It provides practical advice on how to do effective, imaginative, proactive Vulnerability Assessments based on the authors 30+ years of experience as a vulnerability assessor. ]]>

We can't test our way to good #security. Why? Because we can't test—or prevent—what we have not envisioned. (Think 9/11.) Effective, imaginative vulnerability assessments are essential. This book explains how to do them based on the 35+ years experience of a Vulnerability Assessor. This book is the missing manual for the missing link: It provides practical advice on how to do effective, imaginative, proactive Vulnerability Assessments based on the authors 30+ years of experience as a vulnerability assessor. ]]>
Sun, 19 Jul 2020 19:05:42 GMT /slideshow/vulnerability-ssessments/237052820 noham1887@slideshare.net(noham1887) Vulnerability Assessments noham1887 We can't test our way to good #security. Why? Because we can't test—or prevent—what we have not envisioned. (Think 9/11.) Effective, imaginative vulnerability assessments are essential. This book explains how to do them based on the 35+ years experience of a Vulnerability Assessor. This book is the missing manual for the missing link: It provides practical advice on how to do effective, imaginative, proactive Vulnerability Assessments based on the authors 30+ years of experience as a vulnerability assessor. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilityassessments-200719190542-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We can&#39;t test our way to good #security. Why? Because we can&#39;t test—or prevent—what we have not envisioned. (Think 9/11.) Effective, imaginative vulnerability assessments are essential. This book explains how to do them based on the 35+ years experience of a Vulnerability Assessor. This book is the missing manual for the missing link: It provides practical advice on how to do effective, imaginative, proactive Vulnerability Assessments based on the authors 30+ years of experience as a vulnerability assessor.
Vulnerability Assessments from Roger Johnston
]]>
30 0 https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilityassessments-200719190542-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Design Reviews Versus Vulnerability Assessments for Physical Security /slideshow/design-reviews-versus-vulnerability-assessments-for-physical-security/226680347 designreviews2020-200201160648
Sometimes Design Review are less scary than Vulnerability Assessments.]]>

Sometimes Design Review are less scary than Vulnerability Assessments.]]>
Sat, 01 Feb 2020 16:06:47 GMT /slideshow/design-reviews-versus-vulnerability-assessments-for-physical-security/226680347 noham1887@slideshare.net(noham1887) Design Reviews Versus Vulnerability Assessments for Physical Security noham1887 Sometimes Design Review are less scary than Vulnerability Assessments. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/designreviews2020-200201160648-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Sometimes Design Review are less scary than Vulnerability Assessments.
Design Reviews Versus Vulnerability Assessments for Physical Security from Roger Johnston
]]>
39 0 https://cdn.slidesharecdn.com/ss_thumbnails/designreviews2020-200201160648-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Journal of Physical Security 12(3) /noham1887/journal-of-physical-security-123 jps123-200201160242
In addition to the usual security news and editor's rants about security, this issue (Volume 12, Issue 3) has papers about: • automatic vehicle security gates • 3D magnetometer arrays as a more secure replacement for BMS • best practices in physical security • design reviews vs. vulnerability assessments JPS, a peer reviewed journal, is hosted by Right Brain Sekurity as a free public service. See http://jps.rbsekurity.com ]]>

In addition to the usual security news and editor's rants about security, this issue (Volume 12, Issue 3) has papers about: • automatic vehicle security gates • 3D magnetometer arrays as a more secure replacement for BMS • best practices in physical security • design reviews vs. vulnerability assessments JPS, a peer reviewed journal, is hosted by Right Brain Sekurity as a free public service. See http://jps.rbsekurity.com ]]>
Sat, 01 Feb 2020 16:02:42 GMT /noham1887/journal-of-physical-security-123 noham1887@slideshare.net(noham1887) Journal of Physical Security 12(3) noham1887 In addition to the usual security news and editor's rants about security, this issue (Volume 12, Issue 3) has papers about: • automatic vehicle security gates • 3D magnetometer arrays as a more secure replacement for BMS • best practices in physical security • design reviews vs. vulnerability assessments JPS, a peer reviewed journal, is hosted by Right Brain Sekurity as a free public service. See http://jps.rbsekurity.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jps123-200201160242-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In addition to the usual security news and editor&#39;s rants about security, this issue (Volume 12, Issue 3) has papers about: • automatic vehicle security gates • 3D magnetometer arrays as a more secure replacement for BMS • best practices in physical security • design reviews vs. vulnerability assessments JPS, a peer reviewed journal, is hosted by Right Brain Sekurity as a free public service. See http://jps.rbsekurity.com
Journal of Physical Security 12(3) from Roger Johnston
]]>
47 0 https://cdn.slidesharecdn.com/ss_thumbnails/jps123-200201160242-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Journal of Physical Security 12(2) /slideshow/journal-of-physical-security-122/162332742 jps122-190808152024
In addition to the usual security news and editor’s rants about security, this (August 2019) issue has papers about security by design,defeating electronic locks with radio frequency attack tools, poor seal practice with pressure-sensitive adhesive label seals, wargaming Brexit, and a revised and updated list of popular (mostly smart ass) security maxims. ]]>

In addition to the usual security news and editor’s rants about security, this (August 2019) issue has papers about security by design,defeating electronic locks with radio frequency attack tools, poor seal practice with pressure-sensitive adhesive label seals, wargaming Brexit, and a revised and updated list of popular (mostly smart ass) security maxims. ]]>
Thu, 08 Aug 2019 15:20:24 GMT /slideshow/journal-of-physical-security-122/162332742 noham1887@slideshare.net(noham1887) Journal of Physical Security 12(2) noham1887 In addition to the usual security news and editor’s rants about security, this (August 2019) issue has papers about security by design,defeating electronic locks with radio frequency attack tools, poor seal practice with pressure-sensitive adhesive label seals, wargaming Brexit, and a revised and updated list of popular (mostly smart ass) security maxims. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jps122-190808152024-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In addition to the usual security news and editor’s rants about security, this (August 2019) issue has papers about security by design,defeating electronic locks with radio frequency attack tools, poor seal practice with pressure-sensitive adhesive label seals, wargaming Brexit, and a revised and updated list of popular (mostly smart ass) security maxims.
Journal of Physical Security 12(2) from Roger Johnston
]]>
242 0 https://cdn.slidesharecdn.com/ss_thumbnails/jps122-190808152024-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Unconventional Security Devices /noham1887/unconventional-security-devices unconventionalsecuritydevices-190527073942
The "Anti-Evidence" approach to security.]]>

The "Anti-Evidence" approach to security.]]>
Mon, 27 May 2019 07:39:42 GMT /noham1887/unconventional-security-devices noham1887@slideshare.net(noham1887) Unconventional Security Devices noham1887 The "Anti-Evidence" approach to security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/unconventionalsecuritydevices-190527073942-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The &quot;Anti-Evidence&quot; approach to security.
Unconventional Security Devices from Roger Johnston
]]>
85 0 https://cdn.slidesharecdn.com/ss_thumbnails/unconventionalsecuritydevices-190527073942-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Making the Business Case for Security Investment /slideshow/making-the-business-case-for-security-investment/130324358 roi-190202233103
Alternative approaches to getting more funding for security.]]>

Alternative approaches to getting more funding for security.]]>
Sat, 02 Feb 2019 23:31:03 GMT /slideshow/making-the-business-case-for-security-investment/130324358 noham1887@slideshare.net(noham1887) Making the Business Case for Security Investment noham1887 Alternative approaches to getting more funding for security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/roi-190202233103-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Alternative approaches to getting more funding for security.
Making the Business Case for Security Investment from Roger Johnston
]]>
107 0 https://cdn.slidesharecdn.com/ss_thumbnails/roi-190202233103-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Journal of Physical Security 11(1) /slideshow/journal-of-physical-security-111/110579586 jps111-180819184033
This is the August 2018 issue of the Journal of Physical Security (JPS). In addition to the usual editor’s rants about security, this issue has papers on • election security • physical security networks • technology for tracking sealed radiological sources • an analysis of active shooter training videos • whether security belongs under Facility Management (Operations) JPS is hosted as a public service by Right Brain Sekurity, a small company devoted to vulnerability assessments, security consulting, and R&D. ]]>

This is the August 2018 issue of the Journal of Physical Security (JPS). In addition to the usual editor’s rants about security, this issue has papers on • election security • physical security networks • technology for tracking sealed radiological sources • an analysis of active shooter training videos • whether security belongs under Facility Management (Operations) JPS is hosted as a public service by Right Brain Sekurity, a small company devoted to vulnerability assessments, security consulting, and R&D. ]]>
Sun, 19 Aug 2018 18:40:33 GMT /slideshow/journal-of-physical-security-111/110579586 noham1887@slideshare.net(noham1887) Journal of Physical Security 11(1) noham1887 This is the August 2018 issue of the Journal of Physical Security (JPS). In addition to the usual editor’s rants about security, this issue has papers on • election security • physical security networks • technology for tracking sealed radiological sources • an analysis of active shooter training videos • whether security belongs under Facility Management (Operations) JPS is hosted as a public service by Right Brain Sekurity, a small company devoted to vulnerability assessments, security consulting, and R&D. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jps111-180819184033-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the August 2018 issue of the Journal of Physical Security (JPS). In addition to the usual editor’s rants about security, this issue has papers on • election security • physical security networks • technology for tracking sealed radiological sources • an analysis of active shooter training videos • whether security belongs under Facility Management (Operations) JPS is hosted as a public service by Right Brain Sekurity, a small company devoted to vulnerability assessments, security consulting, and R&amp;D.
Journal of Physical Security 11(1) from Roger Johnston
]]>
1160 0 https://cdn.slidesharecdn.com/ss_thumbnails/jps111-180819184033-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-noham1887-48x48.jpg?cb=1660327887 Right Brain Sekurity does security consulting, vulnerability assessments, litigation support, and R&D rbsekurity.com https://cdn.slidesharecdn.com/ss_thumbnails/inrisuveritas-220624135348-ede39675-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/humor-security/252054753 In Risu Veritas: Humor... https://cdn.slidesharecdn.com/ss_thumbnails/jps151-220621030908-4d874f1d-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/journal-of-physical-security-volume-151-2022/252026192 Journal of Physical Se... https://cdn.slidesharecdn.com/ss_thumbnails/securityaudits-220613220455-219baeaa-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-auditspdf/251978188 Security Audits.pdf