While many biometric modalities have been tried at the ATM, fingerprint biometrics has become one of the most widely used, partly because of its long history, but more importantly for its ease of use, performance, interoperability, ability to thwart imposters and low cost.
Good old fashioned cycling is enjoying something of a renaissance at present, with people across the world taking to the pedals in search of cheap, environmentally friendly travel. In the UK, few groups have embraced the revolution as whole heartedly as commuters.
Nearly 72 percent of U.S. federal actions involving employee theft in 2014 involved small businesses – organizations with fewer than 500 employees, according to the 2015 Hiscox Embezzlement Watchlist. Within that group, four of every five victim organizations had fewer than 100 employees, and more than half had fewer than 25 employees.
Mention cybersecurity and immediate thoughts turn to technical controls such as firewalls, endpoint detection and patching systems. While these and other technical controls certainly are necessary, they must work in tandem with administrative and physical controls in order to form a mature risk mitigation program. This month, we will explore some of the physical aspects of cyber risk management, which inherently relies upon on-site security personnel and employee training for proper execution.
If you figure that a better economy these days means less metal theft, think again. Theft of copper, aluminum and other metals continues as people see a way to easily make money to buy drugs or other uses.
In June 2014, Sy Alli made a career move that was controversial, daring and, in his opinion, potentially ruining to his future prospects: He became the first director of corporate security for a marijuana-based enterprise: Dixie Brands, Inc.
Three-million offensesagainst UK retailers in 2014 racked up direct costs of £603 million ($913 million U.S.) in 2014 – while the number of in-store thefts fell by four percent, the value per incident climbed 36 percent.
Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!