What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.
Agencies and authorities that provide water, wastewater and dam services don’t face the same regulatory hurdles as power utilities, but they’re also often smaller and have fewer resources, housed as they generally are within municipal governments or other smaller entities.
After receiving the funding to develop several security projects to update or replace systems and components, including upgrading more than 3,000 cameras to IP, across more than 100 facilities that Security Director Kirk Simmons is responsible for securing in Hennepin County, MN, Simmons and his team found themselves in a predicament: navigating the county’s IT department processes for project development, as most systems depend on the IT network and servers for which the Hennepin County IT team has responsibility.
An experimental Ebola vaccine initially developed by the Public Health Agency of Canada has proven to be “highly protective” against the deadly virus in a major trial in Guinea, according to results published on December 23 in The Lancet.
This integrated server, switch and software platform is designed in a compact form factor, and the unit is ruggedized to withstand temperature conditions from -40ºC to 60ºC (-40ºF to 140ºF) without the need for additional heating or air conditioning.
In December, Frontex, the European Border and Coast Guard Agency, provided training for 62 Libyan Coast Guard and Navy officers aboard San Giorgio, a vessel taking part in the EU Naval Force Operation Sophia.
Alleging privacy violations and potentially invasive tracking of activists’ actions, statements and protest plans, the American Civil Liberties Union has taken aim at social media monitoring software that has been used to monitor and analyze social media data from platforms such as Twitter, Facebook and Instagram.
The latest version of this unified IP security platform offers a new disaster recovery mode, enhanced levels of authentication and encryption, augmented video archiving and export management capabilities, and new choices of supported access control software.
Who are the Most Influential People in Security? Find out which security leaders are making a difference in the September issue of Security magazine! Also, read about how New York is shaking up cybersecurity, changes in drone legislation, three steps to prepare for the GDPR, school surveillance savings and more.