This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Cyber crime has been referred to as a “wicked problem,” and its solution may well lie in stronger education.
November 5, 2013
Frederick Chang recently joined Southern Methodist University to develop a multidisciplinary program to tackle the most pressing cyber challenges facing the world today.
When an emergency occurs, whether it is a cardiac or first-aid emergency, or a natural disaster or workplace violence incident, the emergency responder who makes the difference between life and death is one who is well trained.
The Homeland Security Department needs better rules over its use of Twitter, Facebook and other social media services to improve privacy and legal safeguards.
The foundation for creating a security department is risk evaluation and training, and taking training out of the binder and using it in the field could be the key to a thriving program.
With malls turning into today’s town squares, complete with a community full of strollers, bands and holiday decorations, it’s not a place where hazards should intrude.
During the past decade, enterprise resilience has become a hot topic.
July 1, 2013
During the past decade, enterprise resilience has become a hot topic. Its meaning has grown from the original “business continuity and disaster recovery” moniker associated with IT data crashes.
For a long time, security was its own entity in the IT infrastructure. Security and IT didn’t always see eye to eye, and there were often points of contention. Nowadays, as collaboration between the two has become more common, both IT and security are combining forces to better understand the risks and threats to the enterprise.
Some of the most challenging needs facing decision makers in today’s networked surveillance come after the initial deployment. After the selection and installation of hardware, software and camera providers, many begin to realize the benefits of the new system. This involves utilizing the new technologies within a framework of existing training policies, with the objective of exploiting the greatest capabilities of the system.