Steven Seiden, president of Acquired Data Solutions (ADS), has been involved in “digital divide issues” for more than 20 years, and he believes broadening inclusion and diversity in the STEM literacy field is one of his purposes. An engineer by trade, Seiden has experienced a shift in the tech world over the years, watching the convergence of technology, IT and IOT and noting the ever-expanding engineering lifecycle that now includes security.
As a young boy, Frank Figliuzzi had a sense of right and wrong, good and bad. He was so interested in criminal justice that at the age of 11, he wrote a letter to the head of the Federal Bureau of Investigation (FBI) asking for advice on a career in the field.
Event security has evolved well beyond the standard uniformed officers, access control, and incident response. Today’s event security professionals are strategists who use intelligence driven risk-based models to mitigate threats by identifying and addressing gaps and vulnerabilities.
Instead of saying "no" to enterprise travel requests, deploy a little thought and creativity to find "yes, but" solutions to almost any travel situation.
Over the past year, the Infosec Team in Cisco’s Threat Response, Intelligence and Development group launched a Unified Security Metrics (USM) program as a way to make sense of volumes of network data and reduce security risk.
Supreme Court justices debated Monday how much leeway to grant airlines in reporting security threats that are eventually proven false, USA Today reports. The case involves Air Wisconsin Airlines, which argued that it deserves the same immunity from lawsuits as it granted the Transportation Security Administration, the article says. The airline had lost a $1.4 million defamation case after reporting that a pilot, William Hoeper, was “mentally unstable” and could be armed as a passenger on a flight after he failed a simulator test.