A NIST report about its investigation into the 2011 Joplin tornado calls for nationally accepted standards for building design and construction, and public shelters and emergency communications to reduce deaths caused by tornadoes.
Three-quarters of business continuity managers fear the possibility of an unplanned IT and telecoms outage, and 73 percent worry about the possibility of a cyber attack or data breach, according to the annual Business Continuity Institute (BCI) Horizon Scan.
Counterterrorist operatives perform drills on securing and neutralizing threats at major target areas. Although this is an extremely important concept to master, often ignored is one of the most important components in community disaster preparedness: the local area hospital.
Washington state has flunked its disaster preparedness test. According to the American College of Emergency Physicians’ State-by-State Report Card, Washington state received an overall grade of “D+” and an “F” in disaster preparedness.
On April 15, 2013, two pressure cooker bombs exploded at the finish line of the Boston Marathon, killing three and injuring more than 260 others.
February 1, 2014
On April 15, 2013, two pressure cooker bombs exploded at the finish line of the Boston Marathon, killing three and injuring more than 260 others. The attack, and the subsequent manhunt for the bombers, brought to light several issues inherent to event planning: a temporary location, a temporary staff, and the need to protect masses of spectators and participants.
The reality of living without computers, mobile phones and entertainment systems, and managing a transport system thrown into chaos by an absence of traffic lights, trains and subways, may become increasingly common, according to a new academic study.
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.