<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[DEFENDER]]></title><description><![CDATA[Welcome to Defender, the platform that brings you crowd-sourced physical security insights and commentary from leading industry professionals to help you protect lives, secure property, and defend against evolving threats.]]></description><link>https://www.defendervideo.com</link><image><url>https://substackcdn.com/image/fetch/$s_!T3N1!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcbbe55d-17b9-4869-bdfc-7bb99c513ec2_468x468.png</url><title>DEFENDER</title><link>https://www.defendervideo.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 03 Apr 2026 18:40:43 GMT</lastBuildDate><atom:link href="https://www.defendervideo.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Defender Video]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[david.marsh@wavereps.com]]></webMaster><itunes:owner><itunes:email><![CDATA[david.marsh@wavereps.com]]></itunes:email><itunes:name><![CDATA[David Marsh]]></itunes:name></itunes:owner><itunes:author><![CDATA[David Marsh]]></itunes:author><googleplay:owner><![CDATA[david.marsh@wavereps.com]]></googleplay:owner><googleplay:email><![CDATA[david.marsh@wavereps.com]]></googleplay:email><googleplay:author><![CDATA[David Marsh]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Alert fatigue isn’t the issue. Alert handoff is.]]></title><description><![CDATA[Security teams have more data than ever. The real gap is what happens after the alert. Agentic AI is closing it.]]></description><link>https://www.defendervideo.com/p/alert-fatigue-isnt-the-issue-alert-handoff-is</link><guid isPermaLink="false">https://www.defendervideo.com/p/alert-fatigue-isnt-the-issue-alert-handoff-is</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Mon, 05 May 2025 13:21:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9829fb01-77fe-4847-8f43-784a2598a9f4_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We&#8217;ve spent years perfecting the front end of security.</p><p>Better cameras. Smarter analytics. Faster alerts.</p><p>But most operations still lack what matters most: <em>action</em>.</p><p>Detection has evolved. Response? Not so much.<br>And that&#8217;s why most incidents fall through the cracks.</p><p>Historically, the only fix has been to add more staff.<br>That might close the gap, but it&#8217;s rarely&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/alert-fatigue-isnt-the-issue-alert-handoff-is">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Automating Incident Response]]></title><description><![CDATA[From detection to deterrence, AI is fundamentally changing security operations, shifting from passive monitoring to proactive, automated incident response.]]></description><link>https://www.defendervideo.com/p/automating-incident-response</link><guid isPermaLink="false">https://www.defendervideo.com/p/automating-incident-response</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Mon, 03 Mar 2025 00:57:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/751893ed-bb5d-4b43-ba14-c303cf12d343_1920x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>At 2:37 AM, an intruder scales the fence of a high-volume logistics hub. An AI-enabled camera detects the breach, triggering an audio and visual warning that startles the trespasser. Simultaneously, security is alerted. Recognizing the severity of the situation, the system escalates the event to an AI agent, which follows predefined protocols to notify &#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/automating-incident-response">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Physical Security: Predictions and Insights for 2025]]></title><description><![CDATA[With 2024 behind us, it's worth reflecting on what we discussed and saw unfold throughout the year, and where physical security is heading in 2025.]]></description><link>https://www.defendervideo.com/p/physical-security-predictions-and-insights-for-2025</link><guid isPermaLink="false">https://www.defendervideo.com/p/physical-security-predictions-and-insights-for-2025</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Thu, 02 Jan 2025 02:13:58 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/94d8322e-98bf-4018-aa25-72dfda5362eb_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today we revisit the key topics that shaped 2024 and explore how some of these made headlines&#8212;while looking ahead at what&#8217;s next for 2025.</p>
      <p>
          <a href="https://www.defendervideo.com/p/physical-security-predictions-and-insights-for-2025">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[5G & Security Trailers]]></title><description><![CDATA[Ever found yourself staring at a security trailer out in the boondocks, thinking, "How's this thing even transmitting video?"]]></description><link>https://www.defendervideo.com/p/5g-and-security-trailers</link><guid isPermaLink="false">https://www.defendervideo.com/p/5g-and-security-trailers</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Mon, 02 Dec 2024 14:07:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6c85dd37-ccbc-4eb3-9cd6-f4a34b433e73_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>5G didn't excite me for phones, but it's revolutionizing video surveillance. With its super-fast speeds and low latency, what was once rare in security monitoring is now standard.  We can now roll out security trailers almost anywhere. </p><p><strong>With 5G, we're looking at:</strong> </p><ul><li><p><strong>Real-Time, HD Monitoring:</strong> Thanks to 5G, we have live, high-definition video streaming from a&#8230;</p></li></ul>
      <p>
          <a href="https://www.defendervideo.com/p/5g-and-security-trailers">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[From Passive to Proactive Security with AI]]></title><description><![CDATA[Unlike 'NFTs' and 'metaverse hype,' AI isn&#8217;t a fleeting trend. AI enables security teams to move from passive monitoring to proactive threat detection and response.]]></description><link>https://www.defendervideo.com/p/from-passive-to-proactive-security-with-ai</link><guid isPermaLink="false">https://www.defendervideo.com/p/from-passive-to-proactive-security-with-ai</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Mon, 25 Nov 2024 15:10:47 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/52501e4f-1c79-4161-a032-97899a7ebb31_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There's a lot written about AI these days, especially in security magazines, but as someone who&#8217;s now immersed in AI and robotics everyday, I&#8217;ve seen firsthand how these technologies are changing the security industry forever.</p><blockquote><p>AI enables security teams to move from <em>passive monitoring</em> to <em>proactive threat detection and response</em>.</p></blockquote><p>Manufacturers continue to in&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/from-passive-to-proactive-security-with-ai">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Beyond Protection: How Security Drives Profitability]]></title><description><![CDATA[Rethinking Security: How Smarter Security Can Boost Profits, Optimize Space, and Improve Workplace Satisfaction]]></description><link>https://www.defendervideo.com/p/beyond-protection-how-security-drives</link><guid isPermaLink="false">https://www.defendervideo.com/p/beyond-protection-how-security-drives</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Wed, 06 Nov 2024 15:11:09 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/12580198-c862-45e1-9012-160d5defa5d2_1920x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When people outside the industry think of security systems, they often think about the obvious: access control, cameras and alarms. </p><p>However, these days, we&#8217;re going beyond just stopping &#8220;bad guys.&#8221; by actually helping businesses improve their bottom line.</p><p>We&#8217;re seeing a healthy trend that will move security from being seen as the &#8220;insurance policy&#8221; to th&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/beyond-protection-how-security-drives">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Unlocking LinkedIn's Potential with Tyler Schmoker]]></title><description><![CDATA[Watch now | Discover How to Leverage LinkedIn for Professional Development in Physical Security]]></description><link>https://www.defendervideo.com/p/s2e6-tyler-schmoker-unlocking-linkedins-potential</link><guid isPermaLink="false">https://www.defendervideo.com/p/s2e6-tyler-schmoker-unlocking-linkedins-potential</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Tue, 29 Oct 2024 13:07:23 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/150871277/0fedc7a6b9d25c7ecc84b6bde1a6f4d1.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Join Dave and Tyler for a different side of the physical security industry&#8212;LinkedIn.</p><p>In this episode of the Defender Podcast, Dave sits down with <a href="https://www.linkedin.com/in/tyler-schmoker-76997756/">Tyler Schmoker</a>, an Army veteran, security professional, and entrepreneur. </p><p>With over two decades of experience in security management and consulting, Tyler has a wealth of knowledge to share about navigating LinkedIn as a physical security professional.</p><p>Tyler discusses his approach to developing his network and emphasizes the importance of professional development in the security field. </p><p>He explains how leveraging LinkedIn can significantly enhance career opportunities and shares actionable strategies for creating an impactful LinkedIn profile, engaging with industry content, and building a professional network that can lead to new connections and career advancements.</p><p>Watch or listen to the full episode on Defender.Video to learn how to elevate your professional presence and expand your connections in our growing industry!</p>]]></content:encoded></item><item><title><![CDATA[Why Insider Threats Require a Converged Approach to Security]]></title><description><![CDATA[Insider risks are evolving. Threats now encompass a wider range of vulnerabilities, from disgruntled employees to accidental leaks and even nation-state actors infiltrating organizations.]]></description><link>https://www.defendervideo.com/p/insider-threats-require-a-converged-approach</link><guid isPermaLink="false">https://www.defendervideo.com/p/insider-threats-require-a-converged-approach</guid><dc:creator><![CDATA[Vigilia: A Journal]]></dc:creator><pubDate>Mon, 14 Oct 2024 13:46:06 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e805140c-eb24-45f3-a263-1685fe740be4_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In a high-profile 2022 case, North Korean operatives exploited remote work opportunities to gain employment at U.S. tech companies, enabling them to steal sensitive data and intelligence for the regime.</p><p>This case shows how insider risks extend far beyond a single department, requiring a unified approach to security.</p><p>According to the 2023 Verizon Data Breach Investigations Report (DBIR), insider threats account for nearly 25% of industry data breaches. Whether intentional or accidental, the result is the same - organizations face significant financial and reputational damage as a result of an incident.</p><p>Given the complexity and frequency of these threats, a siloed approach to security is untenable. In today&#8217;s environment, security leaders must adopt a converged strategy that brings together physical security, IT, HR, legal, and other critical stakeholders to address insider risks effectively.</p><p>This article will explore how breaking down silos between departments can help security practitioners stay ahead of insider threats and build a unified defense against them.<br></p><h4>The Evolving Nature of Insider Threats</h4><p>Traditionally, insider threats were often associated with cybersecurity breaches, such as employees stealing data or introducing malware into corporate systems. However, today&#8217;s insider risks are far more complex.</p><p>These threats now include everything from unintentional data leaks by employees to disgruntled staff members planning physical harm and even cases of espionage involving nation-state actors.</p><p>For example, consider the recent cases of foreign actors gaining employment at multinational companies through hybrid work arrangements only to siphon sensitive data back to adversarial governments. </p><p>Meanwhile, accidental threats&#8212;such as an employee unintentionally sharing privileged information &#8212; remain just as dangerous. The convergence of digital, physical, and human elements in these threats underscores the need for a holistic approach to risk management.</p><p>As the threat landscape broadens, it becomes clear that insider threats are not just a cybersecurity problem. They are organizational risks that affect every department and require a united response.<br></p><h4>The Problem with Silos: Delayed Responses and Missed Signals</h4><p>One of the most significant challenges in mitigating insider threats is the siloed nature of many organizations. Too often, physical security teams, IT departments, HR, and legal work in isolation, each focused on their specific domains. This disjointed approach can lead to delayed responses, missed warning signs, and inefficiencies in managing threats.</p><p>For instance, a cybersecurity team might detect unusual network behavior. Still, if they fail to communicate with HR or physical security, they may miss the larger context&#8212; such as that the employee in question has recently faced disciplinary action or tried unauthorized access to a restricted area.</p><p>Without a converged approach, information <em>slips through the cracks</em>, increasing the risk that an insider threat will go unnoticed until it is too late. By nature, insider threats require a multifaceted view, blending physical, digital, and human elements. </p><blockquote><p><strong>When teams fail to collaborate, they fail to detect and prevent a threat before it escalates.</strong><br></p></blockquote><h4>The Case for a Converged Approach to Security</h4><p>A converged approach to security brings together different departments&#8212;such as physical security, cybersecurity, legal, and HR&#8212;into a cohesive strategy for identifying and mitigating insider issues.</p><p>By sharing information and resources, teams can create a more cohesive &#8220;common operating picture,&#8221; allowing for better decision-making and faster responses. In a converged model, insider risks are viewed holistically, regardless of where they begin.</p><p>Insider risks are complex, multifaceted threats that can strike any organization from the inside or outside. In the face of these evolving threats, a converged strategy that unifies crucial stakeholders to create a more resilient, responsive defense is not just a "nice to have;" it should be a "must have."</p><blockquote><p><strong>Leadership expert Patrick Lencioni said, "Teamwork begins by building trust. And the only way to do that is to overcome our need for invulnerability." </strong></p></blockquote><p>Breaking down silos and encouraging collaboration isn't just about structure; it's about building trust across the organization to tackle insider threats together.</p>]]></content:encoded></item><item><title><![CDATA[Inside Colocation: Doug Dreher on Security Challenges and Solutions]]></title><description><![CDATA[On this Defender podcast, Doug Dreher and I discuss colocation facilities and the unique security challenges they present.]]></description><link>https://www.defendervideo.com/p/s2e5-doug-dreher-inside-colocation-security</link><guid isPermaLink="false">https://www.defendervideo.com/p/s2e5-doug-dreher-inside-colocation-security</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Thu, 10 Oct 2024 22:30:10 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/150070721/7c5b4de471e9ab6d7379d72385fc38f0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>With the rapid growth of hyperscalers, understanding how to effectively manage security in these shared environments is more important than ever.</p><h2><strong>Defining the Security Landscape</strong></h2><p>Colocation facilities are designed to house multiple clients' IT infrastructure within a single space. This shared environment necessitates a comprehensive threat analysis to identify potential vulnerabilities. Doug emphasized the importance of leveraging clean data versus dirty data and utilizing paid intelligence analysis to inform security strategies.</p><h2><strong>Key Security Considerations</strong></h2><ol><li><p><strong>Physical Security Measures</strong>: The exterior of colocation facilities often lacks adequate physical barriers. Issues such as fencing regulations imposed by Authorities Having Jurisdiction (AHJ) can complicate security efforts. Organizations must assess whether they have staffed guard booths or effective intercom systems in place.</p></li><li><p><strong>Access Control Protocols</strong>: A robust access control system is essential. This includes evaluating how vehicles are vetted upon entry and whether facilities utilize mantraps or other layers of protection. Doug highlighted that many colocations are hesitant to disclose details about their camera systems without a non-disclosure agreement (NDA).</p></li><li><p><strong>Infrastructure Assessment</strong>: Understanding the facility's construction&#8212;whether multistory or discreetly located&#8212;plays a significant role in risk management. Key factors such as power distribution, cooling methods, and backup systems must be evaluated for resilience and continuity of operations.</p></li><li><p><strong>Interior Security Features</strong>: Inside colocation facilities, cages protect critical assets but may lack mantraps, which can expose vulnerabilities. It's crucial to assess how access control is managed across multiple tenants and how security providers monitor these systems.</p></li><li><p><strong>Construction Phase</strong>: Doug emphasized the critical importance of the &#8220;construction security piece&#8221; phase in security management for colocation facilities. This involves meticulous planning and execution to ensure that security measures are integrated from the ground up.</p><p></p></li></ol><h4><strong>Advanced Security Solutions</strong></h4><p>Doug discussed the necessity of implementing multiple layers of access control, including programmable lockers and advanced scanning technologies like millimeter-wave scanners for personnel. He also stressed the importance of encryption and robust incident management protocols to protect against unauthorized access.</p><h4><strong>Future-Proofing Security Infrastructure</strong></h4><p>As technology evolves, so must our approach to securing colocation facilities. Doug pointed out that integrating intelligent systems capable of real-time threat detection can significantly enhance security posture. Proactive measures are essential; better a false alarm than a post-incident report.</p><h4><strong>Bottom Line</strong></h4><p>The conversation with Doug reinforced that as organizations rely on colocation facilities, physical security leaders must adapt their strategies to meet the challenges. </p><p>By prioritizing thorough assessments, leveraging technology, and fostering collaboration between IT and security teams, businesses can effectively safeguard their critical infrastructure.</p><p>Thanks for tuning in!</p>]]></content:encoded></item><item><title><![CDATA[Chuck Randolph: Building a Risk-Aware Culture and Fostering Collaboration]]></title><description><![CDATA[Protecting People, Property and Information From Insider Threats.]]></description><link>https://www.defendervideo.com/p/chuck-randolph-s2e4-building-a-risk-aware-culture</link><guid isPermaLink="false">https://www.defendervideo.com/p/chuck-randolph-s2e4-building-a-risk-aware-culture</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Mon, 30 Sep 2024 13:07:16 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/149583737/f597b53b090f3e1891d2970366f1b761.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we welcome Chuck Randolph, Chief Security Officer with Ontic, with an impressive background in Corporate Security, U.S. Department of State and Military. </p><p>Together, we discuss the various threat vectors, how security can unify the effort for organizations to become threat aware, and the power of our security networks if incidents occur. </p><p>Chuck emphasizes the need for a unified approach involving various departments like HR, legal, cyber, and physical security.</p><p>He shares insights on mitigating risks through assessment, governance, monitoring, and education. He also highlights the role of technology and the critical need for a common operating picture. </p><p>Key takeaway: building a risk-aware culture and fostering collaboration across departments are crucial in managing insider threats effectively.</p><p><strong>Follow Chuck Randolph here.</strong></p><p>https://www.linkedin.com/in/chuckrandolph/</p><p><strong>Conversations In Close Protection Podcast</strong></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a7450a5968efef391b8c1faf0&quot;,&quot;title&quot;:&quot;Conversations in Close Protection&quot;,&quot;subtitle&quot;:&quot;International Protective Security Board&quot;,&quot;description&quot;:&quot;Podcast&quot;,&quot;url&quot;:&quot;https://open.spotify.com/show/5nG1BZUhmqa3DkdZgXn5rm&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/show/5nG1BZUhmqa3DkdZgXn5rm" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><p><strong>The Ontic Protective Intelligence Podcast</strong></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a6bb2957be8c4da33efb130ca&quot;,&quot;title&quot;:&quot;The Ontic Protective Intelligence Podcast&quot;,&quot;subtitle&quot;:&quot;Ontic, The Ontic Center for Protective Intelligence&quot;,&quot;description&quot;:&quot;Podcast&quot;,&quot;url&quot;:&quot;https://open.spotify.com/show/1tSYEGHbQiPBTGodptfLsz&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/show/1tSYEGHbQiPBTGodptfLsz" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><p></p><p>Subscribe to Defender and stay informed, don't forget to check out defender.video for more detailed insights into enterprise-level security.</p>]]></content:encoded></item><item><title><![CDATA[Securing Hybrid Workspaces: The Importance of Visitor Management Systems]]></title><description><![CDATA[How can a visitor management system streamline security, while maintaining a positive impression on visitors within a hybrid work environment?]]></description><link>https://www.defendervideo.com/p/hybrid-workspaces-and-visitor-management-systems</link><guid isPermaLink="false">https://www.defendervideo.com/p/hybrid-workspaces-and-visitor-management-systems</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Mon, 09 Sep 2024 14:30:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c8599ccc-4dc3-4158-a335-8abc5aa2ee2c_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Visitor Management Systems</h2><p>Visitor Management Systems have become crucial since 2020, especially as offices navigate the challenges associated with hybrid work models. </p><p>These systems not only streamline the visitor check-in process but also enhance security and improve the overall experience for visitors. </p><p>My first experience using a visitor management sys&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/hybrid-workspaces-and-visitor-management-systems">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Warehouse and Distribution Center Security Threats]]></title><description><![CDATA[Warehouses and distribution centers play a crucial role in supply chain security by ensuring the safe and efficient movement of goods from suppliers to customers.]]></description><link>https://www.defendervideo.com/p/warehouse-and-distribution-center-security</link><guid isPermaLink="false">https://www.defendervideo.com/p/warehouse-and-distribution-center-security</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Fri, 30 Aug 2024 15:54:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/22f30783-92c8-453e-82bc-fd1b818e8ad1_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As of 2024, the warehousing and distribution sector in the United States accounts for around 5% of private-sector jobs.</p><p>With sites located in all 50 states, big or small, their impact on our everyday lives can&#8217;t be overstated, ranging from the food we buy at the grocery store to the equipment we use on our jobs. </p><p>It&#8217;s everything.</p><p>With so much at stake, it&#8217;&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/warehouse-and-distribution-center-security">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Safety Starts Here: Best Practices for Securing Parking Lots]]></title><description><![CDATA[Parking lots and garages are notoriously challenging security environments and are the third most common location for violent crime.]]></description><link>https://www.defendervideo.com/p/parking-lot-safety-and-security-best-practices</link><guid isPermaLink="false">https://www.defendervideo.com/p/parking-lot-safety-and-security-best-practices</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Thu, 22 Aug 2024 19:45:28 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/53a1d9d0-6294-41d2-848b-da077fd601c7_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This article examines statistics related to parking lot incidents, common challenges faced by security teams, along with some of the security layers frequently implemented to ensure the safety of employees and visitors.</p><h4>The Numbers</h4><p>According to the FBI, parking lots and garages are the third most common location for violent crimes, with approximately 2 mi&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/parking-lot-safety-and-security-best-practices">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Zero Trust Framework in Physical Security]]></title><description><![CDATA[The zero trust framework started as a cybersecurity concept, but it&#8217;s increasingly being embraced in the physical security industry.]]></description><link>https://www.defendervideo.com/p/zero-trust-framework-in-physical-security</link><guid isPermaLink="false">https://www.defendervideo.com/p/zero-trust-framework-in-physical-security</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Wed, 14 Aug 2024 13:16:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f4261016-31f5-4677-982f-c93fce490daa_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;ve been reading a lot about &#8220;zero trust frameworks&#8221;, and wanted to take a closer look at its adoption within the physical security industry, and how it improves an organizations security posture.</p><p>Before we jump into the article, I&#8217;d love to know if you&#8217;ve already implemented a zero trust framework, and your thoughts in the comments below.</p><p>Back to the ar&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/zero-trust-framework-in-physical-security">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[DJI Drone Ban Debate in the NDAA]]></title><description><![CDATA[Potential ban of DJI drones in the United States, as part of the National Defense Authorization Act (NDAA)]]></description><link>https://www.defendervideo.com/p/dji-drone-ban-debate-in-the-ndaa</link><guid isPermaLink="false">https://www.defendervideo.com/p/dji-drone-ban-debate-in-the-ndaa</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Mon, 05 Aug 2024 16:03:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fc88fd08-03b9-4f6b-8016-6eabc5a99482_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the world of drones, Shenzhen DJI Innovation Technology (DJI) is the undisputed leader, commanding a staggering 80% of the U.S. market. But this dominance is now under scrutiny as the National Defense Authorization Act (NDAA) debates a potential ban on DJI products. </p><p>For us in the physical security field, this isn't just industry chatter&#8212;it's a develo&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/dji-drone-ban-debate-in-the-ndaa">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Defender Rewind: Defining Modern Access Control and Its Growing Impact]]></title><description><![CDATA[Lee Odess from Access Control Executive Group, thought leader and international speaker, talks about the past, present and future of access control.]]></description><link>https://www.defendervideo.com/p/defender-rewind-defining-modern-access-control</link><guid isPermaLink="false">https://www.defendervideo.com/p/defender-rewind-defining-modern-access-control</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Sun, 04 Aug 2024 15:09:56 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/147225923/1b1d69f996ecbf10736d20980d8d0995.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Watch the full podcast episode only on <a href="https://www.defendervideo.com/p/lee-odess-defender-podcast-s2e3">Defender.Video</a></strong></p><p>Lee emphasizes the need for the industry to adapt to modern enterprise demands, integrate new players, and embrace a hybrid approach between on-site and cloud solutions.</p><p>Subscribe to Defender for more in-depth discussions on the cutting edge of security technology, and visit our website for additional insights into enterprise-level security solutions.</p>]]></content:encoded></item><item><title><![CDATA[Lee Odess: Defining Modern Access Control and Its Growing Impact ]]></title><description><![CDATA[Lee Odess from Access Control Executive Group, thought leader and international speaker, talks about the past, present and future of access control.]]></description><link>https://www.defendervideo.com/p/lee-odess-defender-podcast-s2e3</link><guid isPermaLink="false">https://www.defendervideo.com/p/lee-odess-defender-podcast-s2e3</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Thu, 01 Aug 2024 13:07:06 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/147223616/5d5edb2d3842ff8f9e7bf5049e047085.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of Defender, David Marsh welcomes Lee Odess, CEO of <a href="https://www.leeodess.com/executivebrief">Access Control Executive Brief</a>,  to discuss his background in the security industry and his journey to becoming an international speaker and thought leader in the access control space.</p><p><strong>Key topics covered in this episode include:</strong></p><p>We explore the significant transformations in the access control market, especially with the rise of modern access control with cloud, mobile, and wallet (Apple, Google and Samsung), and what that means for the industry.</p><p>Lee emphasizes the need for the industry to adapt to modern enterprise demands, integrate new players, and embrace a hybrid approach between on-site and cloud solutions.</p><p>He also highlights the importance of improving user experience and streamlining the deployment of best-in-class technologies. </p><p>The discussion concludes with recommendations for security managers on updating their systems and the promising future prospects in the access control industry.</p><p>Subscribe to Defender for more in-depth discussions on the cutting edge of security technology, and visit our website for additional insights into enterprise-level security solutions.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.defendervideo.com/p/lee-odess-defender-podcast-s2e3?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thank you for reading DEFENDER. This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.defendervideo.com/p/lee-odess-defender-podcast-s2e3?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.defendervideo.com/p/lee-odess-defender-podcast-s2e3?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[The Growing Demand for Extended Video Surveillance Retention]]></title><description><![CDATA[The latest Defender article explores the driving force behind the shift towards longer video surveillance retention periods.]]></description><link>https://www.defendervideo.com/p/demand-for-extended-video-surveillance-retention</link><guid isPermaLink="false">https://www.defendervideo.com/p/demand-for-extended-video-surveillance-retention</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Fri, 19 Jul 2024 13:19:04 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/602bfda6-8bdf-4e03-84bf-1d7c2b13b396_1920x1280.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It's clear that we're witnessing some big developments in the world of video surveillance, a market valued at around $53.7 billion in 2023 and driven by technological advancements, changing regulatory requirements, and the ever-growing need for enhanced security.</p><h4><br>The Growing Demand for Extended Retention</h4><p>Gone are the days when businesses could get by with&#8230;</p>
      <p>
          <a href="https://www.defendervideo.com/p/demand-for-extended-video-surveillance-retention">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Defender Rewind: AXIS Communications on Visual Intelligence]]></title><description><![CDATA[Defender Rewind - David Marsh and John Callahan from Axis Communications discusses the change from traditional Video Surveillance to Visual Intelligence.]]></description><link>https://www.defendervideo.com/p/defender-rewind-axis-communications</link><guid isPermaLink="false">https://www.defendervideo.com/p/defender-rewind-axis-communications</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Sat, 13 Jul 2024 03:17:21 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/146565723/2c9916fd508664025e3d95df7ec0da62.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this Defender Podcast Rewind - David Marsh and John Callahan from Axis Communications discusses the change from traditional Video Surveillance to Visual Intelligence, providing businesses operational efficiencies unimaginable before advancements in chipsets, analytics and artificial intelligence.</p><h4>John brings up a good point.</h4><p>It wasn&#8217;t long ago that electronic security was thought of as an insurance policy, without the legal requirements of fire and life safety.  Like insurance, purchases were scrutinized and seen as a burden, until an incident.</p><p>Camera sensors are performing more than visual identification, they&#8217;re providing visual intelligence, from detection, to operational efficiencies with AI.</p><p>This changes the way we design camera systems, from being reactive &#8220;witnesses of a crime&#8221;, to active deterrents of crime, and productive assets for the organization.</p><h4>This requires asking new questions.</h4><p>For example, if I were speaking with a physical security manager responsible for a production floor, they were typically concerned about security of that space, worker safety, and ensuring they&#8217;d have video footage of any accidents for legal.</p><p>Today, we could include the production manager into the conversation, to determine what a good workflow should look like, if they would need to be alerted to production slowdowns, or mechanical issues.</p><p>Security is now able to incorporate additional stakeholders when budgeting for security initiatives.  This lessens the justification when requesting better equipment, because these systems can provide more value.</p><p>While having additional stakeholders involved can add time to the review process, and potentially cause design changes.  Security can lead the project to ensure the design ultimately protects people, property and information.</p><h4>Wait a second, did I just say information?</h4><p>Today information is a key asset that must physically be protected by security, not just cybersecurity.  The most effective sabotage, or infiltration efforts require getting past physical security departments, but that&#8217;s for another article.</p><p>Thanks for reading.</p>]]></content:encoded></item><item><title><![CDATA[John Callahan: From 1984 to 2024, AXIS Communications Continues to Innovate]]></title><description><![CDATA[Watch now | David Marsh and John Callahan from Axis Communications, the industry leader in video surveillance, speak about the company, their network solutions and the future.]]></description><link>https://www.defendervideo.com/p/john-callahan-from-1984-to-2024-axis</link><guid isPermaLink="false">https://www.defendervideo.com/p/john-callahan-from-1984-to-2024-axis</guid><dc:creator><![CDATA[David Marsh]]></dc:creator><pubDate>Fri, 12 Jul 2024 00:54:31 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/146514157/74cc5ab6a11f8182320c842ccf994794.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>Defender</em>, David Marsh speaks with a long-time friend and colleague, <a href="https://www.linkedin.com/in/john-callahan-51a0b115/">John Callahan</a>, Director of the Southeast Business Area for <a href="https://www.axis.com/en-us">Axis Communications</a>. Dave and John discuss Axis Communications' history of innovation and their continued leadership in the physical security industry due to their unique approach.</p><p>Axis Communications has a 40-year history of innovation. Since 1984, they have developed some of the very first Internet of Things (IoT) devices aimed at connecting devices to IP networks, created the first IP camera in 1996, and developed the ARTPEC chipset that has helped Axis become the $1.6 billion company we know today.</p><p>John Callahan has a 30-year career in the physical security industry and provides great insights into Axis Communications' philosophy and approach to the industry.</p><p>With an extensive product range, Axis Experience Centers provide a unique capability for end customers and systems integrators to see the technology working and integrating with their many Axis Technology Integration Partners.<br><br><strong>Key topics covered in this episode include:</strong></p><ul><li><p>John Callahan: How Did You Get Into Security?</p></li><li><p>Axis Communications' History of Innovation</p></li><li><p>Axis from Video Surveillance to Operational Efficiency</p></li><li><p>AI-Powered AXIS P3738-PLE Panoramic Camera</p></li><li><p>Axis Cloud Program</p></li><li><p>Technology Integration Partner Program</p></li><li><p>Axis and Cybersecurity</p></li><li><p>Axis Communications' Approach to Channel Partnerships</p></li><li><p>Axis Experience Centers</p></li><li><p>What Products Surprise Customers and Channel Partners?</p></li><li><p>Axis at GSX 2024 and AXIS Q1809-LE Bullet Camera</p></li><li><p>How to Connect with Axis Communications</p></li></ul><p>Subscribe to <em>Defender</em> for more in-depth discussions on the cutting edge of security technology, and visit our website for additional insights into enterprise-level security solutions.</p>]]></content:encoded></item></channel></rss>