New York Governor Andrew Cuomo announced a plan to revamp New York City’s bridges and tunnels, including equipping 10 bridges and tunnels leading into the city with facial recognition and license plate reading technology.
Sometimes it can be difficult to measure how well a security system is working. “You can’t measure crimes that aren’t committed,” says Steve Reed, security director at Arden Fair Mall in Sacramento, Calif.
In a retail environment, much of the security focuses on protecting the merchandise. Yet, the risks begin long before the merchandise makes it to the store. Security has to begin with the supply chain and in warehouses and distribution centers.
While a megapixel camera can provide long-distance, precise detail in surveillance applications, does that detail expand to the edges of the monitor display, or is the license plate on the edge of the screen out of focus?
My first meeting with security executives in Chicago in the early 1980s included some of those attendees getting into a fist fight, due in great part to the “two-fer” beverage policy at the now and should-have-been-then-closed policy of the Chicago Millionaire’s Club. No doubt, it’s good to see passion. But, overall, security has been in an obvious struggle within their organizations for many years, more often over budgets.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!