University of Utah Police are now using body-worn cameras to promote accountability; increase public trust; provide supportive documentation for complaints, investigations and prosecutions; and improve training opportunities.
Secretary of Homeland Security Alejandro N. Mayorkas issued a National Terrorism Advisory System (NTAS) Bulletin regarding the heightened threat environment across the United States, especially leading up to and following the 20th Anniversary of the September 11, 2001 terror attacks as well as religious holidays that could serve as catalyst for targeted violence.
The Cybersecurity and Infrastructure Security Agency (CISA) released a new downloadable Cybersecurity Workforce Training Guide to assist future and current cybersecurity and information technology (IT) professionals chart a successful career path.
Earlier this year, the San Jose Unified School District trustees voted to end the district's school resource officer (SRO) program without a plan for campus security going forward.
The Star of Hope Mission serves Houston’s homeless communities with help for their immediate crisis needs and with longer term life-changing recovery programs. The organization needed to install a security system at the Women and Family Development Center that would allow them to provide a safe environment in which their clients could recover.
Ransom-related distributed denial of service (RDDoS) is a more prevalent threat to organizations than ransomware, according to new research, with 70% of victims targeted multiple times.
On a mission to empower a more secure, interconnected world, the National Cyber Security Alliance has partnered with cybersecurity organizations to launch a resource initiative aimed at raising diversity and closing the cybersecurity talent gap.
Companies need to create a digital ecosystem where cybersecurity is an expectation, not an ‘add-on,’ writes Tim Grieveson, Chief Information Security Officer at AVEVA.
Security teams who aim to control secure access to networked applications and sensitive data often focus on the authentication of user credentials. Yet, the explosive growth of connected devices and machines in today’s enterprises exposes critical security vulnerabilities within machine-to-machine communications, where no human is involved.