What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.
Workplace violence is seldom the freak episode that the media portrays it to be. It rarely involves a mass shooting with a gun, and rarely does it result in a homicide or mass casualty.
Agencies and authorities that provide water, wastewater and dam services don’t face the same regulatory hurdles as power utilities, but they’re also often smaller and have fewer resources, housed as they generally are within municipal governments or other smaller entities.
Over lunch recently, a former Secretary of the Department of Homeland Security asked me, “How long do you think it will be until mobile credentials fully replace plastic badges and cards?”
After receiving the funding to develop several security projects to update or replace systems and components, including upgrading more than 3,000 cameras to IP, across more than 100 facilities that Security Director Kirk Simmons is responsible for securing in Hennepin County, MN, Simmons and his team found themselves in a predicament: navigating the county’s IT department processes for project development, as most systems depend on the IT network and servers for which the Hennepin County IT team has responsibility.
More than 80 percent of countries consider environmental crime a national priority, with the majority saying new and more sophisticated criminal activities increasingly threaten peace and security.
In December, the Italian Comando Carabinieri Antifalsificazione Monetaria, with the support of Europol, dismantled an illegal counterfeit currency print shop in Melegnano.
An experimental Ebola vaccine initially developed by the Public Health Agency of Canada has proven to be “highly protective” against the deadly virus in a major trial in Guinea, according to results published on December 23 in The Lancet.
Chinese researchers have identified two Zika antibodies from an infected patient that could provide mice with complete protection against the mosquito-borne virus.
This video management software delivers an all-in-one solution for video management, video analytics, system integration and alarm management for video surveillance deployments of all sizes.
This integrated server, switch and software platform is designed in a compact form factor, and the unit is ruggedized to withstand temperature conditions from -40ºC to 60ºC (-40ºF to 140ºF) without the need for additional heating or air conditioning.
In December, Frontex, the European Border and Coast Guard Agency, provided training for 62 Libyan Coast Guard and Navy officers aboard San Giorgio, a vessel taking part in the EU Naval Force Operation Sophia.
In response to new emerging threats targeted at ‘‘smart’’ airports, the European Union Agency for Network and Information Security (ENISA) published a report for airport decision makers.
The latest version of this enterprise NVR management system incorporates enhanced visual viewing through map-based event displays and detailed facility layouts.
Alleging privacy violations and potentially invasive tracking of activists’ actions, statements and protest plans, the American Civil Liberties Union has taken aim at social media monitoring software that has been used to monitor and analyze social media data from platforms such as Twitter, Facebook and Instagram.
This NVR is built to increase video management capabilities to small-to-medium surveillance installations, such as retailers, small businesses, and distributed, multi-site locations.
The latest version of this unified IP security platform offers a new disaster recovery mode, enhanced levels of authentication and encryption, augmented video archiving and export management capabilities, and new choices of supported access control software.