An annual assessment of health security and preparedness shows the nation is relatively well-prepared for managing an emergency, although performance on some measures in specific states can be improved.
It’s no secret that our computer hard drives contain a lot of things we’d rather keep secret. Because the information security field is my home turf, I’m troubled by some of the loose talk I hear about how to destroy used drives. There is a whole lot of bad advice online, especially.
The Murrieta, Ga. City Council mandated the use of E-Verify for all businesses in the city. The Department of Homeland Security program is aimed at curbing the employment of illegal immigrants and other ineligible workers.
As a security professional, how do you add value to your organization? We all know that the value of security is often hard to prove – after all, how do you gauge the impact of an event that doesn’t happen because security has prevented it from happening, and then make a convincing case to the C-suite about how much money you’re saving the business?
Joey Sudomir looks for a natural convergence when serving his enterprise. He gets help from Schneider Electric, which offers collective expertise in power, building automation, security and IT management. Here
Consolidation and technological advances are changing the face of the guarding industry. How will this affect enterprise security leaders? Learn more about changes to the security officer services industry as well as the Top Guarding Firms Listing in the December 2016 edition. Also in this issue: a new financial focus on cybersecurity, what to do in your first three months as a new CSO, the ostrich style of security management, and more.