This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Howell will create a cybersecurity program for the institute and work alongside other senior-level members of Georgia Tech's information technology department.
In today’s competitive environment, the consequences of data loss for your business are dire: downtime, lost productivity and long-term reputational damage. Getting senior executives on board with a budget increase to protect your data is paramount to mitigating risk.
The Illinois attorney general has formed a task force comprised of national, state, and local law enforcement as well as large retailers to assess and eliminate organized retail crime in the state.
Many security operations centers employ artificial intelligence and machine learning tools to detect advanced threats, however, reaching too high too quickly with technological solutions can leave security teams with unclear or inefficient workflows.
As organizations re-evaluate their office spaces, leveraging security solutions will be critical to addressing three key areas: improving employee health and safety; enhancing business efficiencies; and, proactively solving business challenges.
Duty of Care spells out responsibilities an organization has for its people. This includes making the workplace safe, preventing risks to health, and ensuring safe working practices are set up and followed. There is a lot to deal with between these areas and the onus is on a variety of managers to ensure nothing falls between those cracks.
Take a crash course in the evolution of armored vehicles and physical security for assets on the move. While the first armored vehicles was built around 1870, advanced technologies have turned protection vehicles into sensing and surveillance machines.
Leveraging Internet of Things (IoT) technology, along with a comprehensive security strategy and proper security technologies, can provide a solution, giving businesses across all industries more visibility than ever before. So how can business leaders utilize these technologies to safeguard their assets and optimize operations, and what do they need to consider?
To keep pace with the ever-evolving security industry, ASIS International released an update to the Protection of Assets (POA) reference set. Refreshed to reflect our changing times and keep security professionals on the leading edge of best practices in the field, this collection is to assist security management directors and professionals responsible for corporate asset protection.