Enterprise card solutions can enable myriad business applications. One example: Identity cards allow Italians to share and use publicly available bicycles.In enterprise-wide identification card access systems, which came first –
Like the requirement to review technological needs against current and future applications, so must companies review and assess current training methodologies and objectives in addressing Workplace Violence Prevention and Security Awareness.
Michael Lynch, chief security officer for DTE Energy, has learned to catch the bad guys and reduce energy theft. “You hear the clichés about working harder and smarter, but we focus on the stuff that makes a difference – we don’t follow the hot thing of the month, we try to keep it simple and hold people accountable,” says Dave Abramson, manager of loss prevention for Hallmark Cards, Inc.
It is rare and wonderful when a new infrastructure platform unites with applications to create a truly dynamic technology solution that provides significant leverage to both the cost/benefit equation of
Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.