- Arenas/Stadiums/Leagues /Entertainment
- Construction, Real Estate, Property Management
- Critical Infrastructure: Electric, Gas, Water
- Education: K-12
- Education: University
- Government: Federal, State and Local
- Hospitality & Casinos
- Hospitals & Medical Centers
- Ports: Sea, Land & Air
- Retail/Restaurants/Convenience Stores
- Transportation/Supply Chain/Warehousing
Government: Federal, State and Local
The Kentucky Senate has passed a cybersecurity bill aimed at boosting protections for information stored in government computers.
Federal officials filed a lawsuit alleging that Sprint Communications Inc. overbilled government agencies $21 million for wiretap service.
Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.
Milton-Freewater, Ore., is the latest city to allow city employees to carry guns while on the job, according to The Union Bulletin. The City Council approved a change in the employee handbook Monday that allows properly-permitted staff to carry a firearm at work.
Failing to prepare for extreme weather events has cost the United States $1.15 trillion in economic losses from 1980 to 2010 and could cost another trillion in coming years.
The U.S. Justice Department has accused United States Investigations Services (USIS) of filing at least 665,000 flawed background checks – about 40 percent of the total submissions – between March 2008 and September 2012.
A Pew Research poll says that most of the American public is tuning out the policy debate over government surveillance.
Barack Obama announced he would end the National Security Agency’s ability to store phone data collected from millions of Americans.
The California State Senate is considering a bill to prohibit law enforcement agencies in California from selling data collected by automatic license plate readers.
The Cisco 2014 Annual Security Report reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks have reached startling levels.