In order to achieve more while reducing costs, many enterprises’ security leaders have turned to automation. By adding thermal cameras as part of a larger intrusion detection system, security departments can reduce false alarm rates and even bring operational value back to the enterprise. Off the coast of Venezuela, there is a cluster of oil platforms.
In the latest development since the targeted attack on a southern California Pacific Gas & Electric Co. substation last April, PG&E is offering a $250,000 reward for information leading to an arrest and conviction in the attack.
Sen. Charles Schumer (D-NY) warns that the April 16, 2014, attack on a California power plant proves that terrorists could take down whole stretches of the U.S. power grid. Schumer said Sunday that power companies currently have the right to veto proposed security requirements, but he is calling for the federal energy regulator and the Department of Homeland Security to draft tougher security standards overseen by Congress that would end the industry’s veto rights.
“Leaders get recognized for their ability to mitigate problems and choose effective strategies. The same is true for security… The status quo or yesterday’s success is never good enough.”
November 5, 2013
“Security is about enabling a mission. Business leaders are able to take our tools and apply them to a variety of settings to create success. Our job is to create an environment of success for the enterprise. It is not what we do, rather, it is how we enable the enterprise to achieve its goals,” shares Frank Taylor, Vice President and Chief Security Officer for The General Electric Company. It is important to note that as you read this, one of America’s (not just security’s) greatest leaders and thinkers will have retired, again.
Start off the new year with an exclusive look at the innovative security technology in the U.S. Bank Stadium in Minneapolis in our annual Security Technology & Innovations Report. This issue also includes guides for retail security leaders on video surveillance techniques, tips for retrofitting your access control systems, and recommendations for the new U.S. president on cybersecurity and terrorism.