In the April issue of Security magazine, read about integration partnerships and their growing success. The Boston Marathon bombing has changed the way integrators look at security for sporting events, see where they are one year after the tragic incident. Read about the 2014 RSA conference and this year's theme of "Threat Intelligence. Also, read about the latest products and news in the security industry.
Retail theft may be a cost of doing business, but intelligent surveillance strategies can help mitigate risks, improve insurance premiums and monitor employees.
A strong security infrastructure doesn’t always start with the technology, it starts with the blueprints – by working with architects and designers, security teams can build the best security plans before the bricks are even laid.
An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?
The 2014 RSA Conference this February in San Francisco highlighted the theme of “Threat Intelligence.”
April 1, 2014
Security intelligence and changes in the nature of security risk were driving conversations and solutions at the 2014 RSA Conference – What will your C-Suite want to know?
How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.
Now, new security protocols and a full year of planning and training guard the athletes, spectators and race course for the 2014 Boston Marathon. What did industry leaders take away from the incident?
How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.
Kratos Public Safety & Security Solutions’ Robert Gaulden discusses the latest trends in security technology and how to manage surveillance for rooftop helipads.
In February, a crowd of cybersecurity professionals attended the RSA Conference in San Francisco.
April 1, 2014
Kent Lawson, founder of Private WiFi, decided to test the wireless network provided at the RSA Conference, and he was surprised at the large amount of completely unprotected communications from security professionals, discovered in a mere 15 minutes.
Active shooter incidents continue to occur around the world as the most disturbing type of a workplace violence incident.
April 1, 2014
Workplace violence incidents are not isolated to any one country, so global enterprises should maintain plans for active shooter or workplace violence events for each country of operations. Learn where to start with these top five universal recommendations.
An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?
Changing your organizational culture is the key to aggressively protecting your stakeholders’ information – how can involving your C-Suite make all the difference?
Corporate executives can develop enough expertise to comfortably navigate key cybersecurity risk management concepts
April 1, 2014
The National Institute of Standards and Technology’s cybersecurity framework is now available, so how can CSOs and CISOs use it to better frame their cyber efforts and prove their case to the C-Suite?
Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.