Archive for March, 2012

Industry warms to solar security

Monday, March 5, 2012 12:49 Be the first to comment

Sun-powered products still niche but are gaining acceptance By Matt Wickenheiser Along the Trans-Canada Highway in Nova Scotia, moose warning signs begin to flash when the massive animals trip beams, slowing down motorists who know the moose are actually nearby and are a real threat. On oil rigs, along pipelines, at wind farms and other [...]

This was posted under category: Trends and Opinions Tags: , , , , , , , , , , , , ,

Specifically Speaking: Benjamin M. Butchko, CPP

Monday, March 5, 2012 12:40 Be the first to comment

Name: Benjamin M. Butchko, CPP Title: President & CEO Company: Butchko Security Solutions Location: Cypress, Texas 1. When you’re designing a system for critical infrastructure, do you use PSIM systems to manage the different components? Why or why not? The answer differs with [each] critical infrastructure environment. Pipelines are different than a single location, even [...]

This was posted under category: Security Specifiers Tags: ,

Specifically Speaking: Sandor Zirulnik

Monday, March 5, 2012 12:17 Be the first to comment

Name: Sandor Zirulnik Title: President Company: Guidepost Solutions Technology Design Consulting (formerly SafirRosetti) Location: New York City Guidepost Solutions (formerly SafirRosetti) has grown a lot the past five years. What has this meant for your consulting group and your local resources around the world? Today’s sophisticated clients are demanding a higher level of management consulting [...]

This was posted under category: Security Specifiers Tags: ,

Spending on smart-grid security to exceed $2 billion in 2016

Monday, March 5, 2012 12:06 Be the first to comment

By Rich Miller The rapid increase in threats to smart-grid security, combined with the need to comply with regulatory statutes, will push the market for related technologies to more than $2 billion in 2016, according to a new report from ABI Research. Smart-grid security includes identity management and access controls, threat and theft defense, cellular [...]

This was posted under category: Stats and Data Tags: , ,