The latest version of this unified IP security platform offers a new disaster recovery mode, enhanced levels of authentication and encryption, augmented video archiving and export management capabilities, and new choices of supported access control software.
As Hurricane Iselle barreled down on the island of Oahu in early August, Alexander Ubiadas was prepared. He had already invested in ruggedized security equipment at isolated facilities, built long-term recovery plans and worked with his staff to get facilities as ready as possible for the storm. Because while people might survive for a while without electricity, they truly need safe, clean water, no matter the weather.
Washington state has flunked its disaster preparedness test. According to the American College of Emergency Physicians’ State-by-State Report Card, Washington state received an overall grade of “D+” and an “F” in disaster preparedness.
In the wake of recent high-profile shootings and incidents, access control, video surveillance and armed guards have become the discussion of the day to deter future attacks. But what can enterprise security leaders do about threats that cannot be prevented? How can you plan for the golden minutes following an incident?
The University of Hawaii has partnered with Ohio company Battelle to market an unmanned robotic vessel capable of exploring disaster zones in harbor ports before first-responder personnel, according to Pacific Business News.
A special task force created after Hurricane Sandy recommends that new construction be built to withstand the force of increasingly dangerous storms, USA Today reports. The Hurricane Sandy Rebuilding Force also urged hardening of existing infrastructure to ward off power failures and fuel shortages, and to maintain cellular service during future catastrophes.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!