This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Many security operations centers employ artificial intelligence and machine learning tools to detect advanced threats, however, reaching too high too quickly with technological solutions can leave security teams with unclear or inefficient workflows.
As organizations re-evaluate their office spaces, leveraging security solutions will be critical to addressing three key areas: improving employee health and safety; enhancing business efficiencies; and, proactively solving business challenges.
Duty of Care spells out responsibilities an organization has for its people. This includes making the workplace safe, preventing risks to health, and ensuring safe working practices are set up and followed. There is a lot to deal with between these areas and the onus is on a variety of managers to ensure nothing falls between those cracks.
Take a crash course in the evolution of armored vehicles and physical security for assets on the move. While the first armored vehicles was built around 1870, advanced technologies have turned protection vehicles into sensing and surveillance machines.
Leveraging Internet of Things (IoT) technology, along with a comprehensive security strategy and proper security technologies, can provide a solution, giving businesses across all industries more visibility than ever before. So how can business leaders utilize these technologies to safeguard their assets and optimize operations, and what do they need to consider?
To keep pace with the ever-evolving security industry, ASIS International released an update to the Protection of Assets (POA) reference set. Refreshed to reflect our changing times and keep security professionals on the leading edge of best practices in the field, this collection is to assist security management directors and professionals responsible for corporate asset protection.
Just like about everything else in the world, the loss prevention/asset protection space has been hugely affected by the pandemic and the “traditional” threat landscape for security professionals in this area has evolved over the past year and half. Let’s take a look at pain points, best practices and COVID-19’s impact on loss prevention.
ASIS International’s Certified Protection Professional (CPP) certification is highly beneficial for security professionals seeking leadership roles. It has its flaws but, anecdotally, I have seen it mentioned in job ads more often than any other designation. When I passed the requisite exam in early February and promised to offer my thoughts, the reaction from future test-takers was welcoming. So here they are. To paraphrase the Law & Order TV franchise, “this is my story. DUN DUN.”
Identifying and reducing excessive costs and overheads while limiting asset loss are needs synonymous with asset tracking technology. But, how can asset-heavy enterprises deploy asset tracking to aid in their efforts and enable efficient operations?