This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology is encouraging chief security officers to help address two information technology challenges faced by the energy sector.
While attention was on potential physical attacks on utilities and other critical infrastructure sites, a growing number of troubling incidents involving computer networks and attackers acting alone and through friendly and not-so-friendly nations has shifted attention to cybersecurity issues.
A key portion of the Why Education Security Graduated to PSIM Technology webinar focuses on educating viewers about what exactly PSIM or physical security information management software is and how it can connect multiple devices and multiple systems through one user interface.
Good Samaritan Hospital Medical Center on Long Island, N.Y., had begun construction on a satellite parking lot for employees when security staff quickly realized that the lot’s remote location posed a surveillance challenge.
If experiments at assisted living facilities are any indication, the future of security and hospital management more broadly will be paved with sensors in every nook and cranny as well as on all types of equipment.
As enterprise security executives working other industries know, healthcare security needs to look inward in addition to considering patients and visitors when it comes to protection strategies.
No matter lessons learned from previous incidents, healthcare facilities continue to embarrassingly report laptops and flash drives containing patient information misplaced, lost and stolen, even in the face of increased regulatory procedures demanding more and better security through the Health Insurance Portability and Accountability Act of 1996 and the more recent Health Information Technology for Economic and Clinical Health Act.