• The Evolution of Social Media Monitoring in Corporate Security
    From “The Evolution of Social Media Monitoring in Corporate Security”
    Security Magazine (01/26/16) Klasson, Eric

    Organizational social media monitoring has become a widespread practice across almost every industry in the US. These tools are used to increase productivity and to emphasize brand management, but they are also critical to organizational security. One of the most important tools to arrive in recent years is the advent of location-based social media. Now it is possible to limit searches to only the areas that interest you. Instead of looking through the entire social media landscape to identify threats to your company, you can now limit that search to areas such as the company headquarters. By adding the context of location, social media becomes a source of intelligence that corporate security groups can use to monitor facilities, assets, and locations of interest. Location-based social media tools can inherently solve the who, what, and where of an issue, but further advances have also allowed more discovery of the why. Using these tools can now reveal the sentiment or motivation behind certain social media posts, or why they contact who they choose to talk to. These tools can provide deep knowledge that can be as important to developing sound security as it can to developing new business plans. While social media monitoring is a relatively new concept, the benefits can be felt from the top of the company all the way to the bottom.

    | Web Link

  • 5 Accused of Stealing Drug Secrets From GlaxoSmithKline
    From “5 Accused of Stealing Drug Secrets From GlaxoSmithKline”
    New York Times (01/21/16) Thomas, Katie

    Five people, including two research scientists, were indicted by federal prosecutors in Philadelphia on charges of stealing trade secrets about drugs to treat cancer and other diseases from British drug giant GlaxoSmithKline. According to prosecutors, GlaxoSmithKline scientist Yu Xue emailed and downloaded confidential information about company products to associates who planned to sell and market the trade secrets through a company they set up in China, called Renopharma. Former company scientist Lucy Xi is also believed to have emailed confidential information. Some of the documents involved a monoclonal antibody, a type of cancer treatment, that the company was developing. The indictment, unsealed on Wednesday, describes Ms. Xue, 45, as the co-leader of the company’s project to develop the drug. Federal prosecutors with the Eastern District of Pennsylvania said that to hide their crime, Ms. Xue and two other associates, Tao Li and Yan Mei, agreed to put the proceeds in the name of Ms. Xue’s twin sister, Tian Xue, who was also charged. Prosecutors noted that Ms. Xi worked with Ms. Xue at Glaxo and was married to Mr. Mei. Glaxo said in a statement that it had been cooperating with federal authorities and “we do not believe the breach has had any material impact” on the company’s business or research and development activity.

  • Security Can’t Be Left Behind at a Rapidly Growing Company
    From “Security Can’t Be Left Behind at a Rapidly Growing Company”
    CSO Online (12/16/15) Pratt, Mary K.

    CIOs at rapidly growing companies have to maintain speed and progress without sacrificing security — a difficult feat. Software development company Informatica is growing quickly, and finding that balance can be difficult. However, senior vice president and CIO Ginna Raahauge has a method for her own success: “Celebrate that the business needs to move at the pace of growth and create a safe environment of disclosure or amnesty approach,” she says. “It’s better for them to help you find them than try to hide something.” CIOs across the spectrum say they’re facing a rapid pace of change in their IT departments, and security has to be a priority or else all the speed and tech-driven competitive advantages can go to waste. Raahauge also says that a shift in thinking is necessary: “Neither security nor IT should ever slow down the pace of delivery; a better objective is to move with speed by changing the mindset of having security at the forefront of the design or business requirement vs. an afterthought or necessary evil.” Other companies are hiring additional security staff, working with outside security experts, and spending more money on security demands.

    Share       | Web Link

  • How to Increase Security Through Building Design
    From “How to Increase Security Through Building Design”
    CSO Online (01/06/16) Ludwig, Sarah E.

    Crime Prevention Through Environmental Design (CPTED) is a method used in security planning that focuses on design, placement, and the way the building is used as a means to increase security in an aesthetically pleasing manner. “CPTED tends to provide a purposeful sense of orderliness in developing a security program,” says William Nesbitt, president of SMSI. “It’s geared at trying to not only have an effective security program, but to have that program be perceived as being effective. It has to do with both the appearance and the perception.” Three fairly standard principles of CPTED are Natural Surveillance, Natural Access Control, and Territorial Reinforcement. One of the foundations of Natural Surveillance is lighting. “Doing a lighting study is one of the most important pieces of the Natural Surveillance principle,” says Toby Heath, electromechanical specialist at ASSA ABBLOY. “That involves measuring the light output every 10 feet throughout parking lots and the perimeter of a building.” With natural access control, “it’s really important to minimize the points of entry to a building to one, for visitors as well as employees,” says Heath. All doors and entrances should be inspected to make sure they close completely and by themselves. Territorial reinforcement is the basic idea of where a property begins. “There is no defining property line, so to speak, so if you give cues as to where the property is and what’s under your control and maybe some signage, it helps you establish the foundational basis that you have control over this piece of land from this point inward and it’s not common area,” says Nesbitt. He also notes that CPTED should be used in tandem with more traditional methods and human behavior.

    | Web Link

« Previous Entries   Next Entries »