This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
In March 2017, drivers on a Montreal highway were stuck for more than 12 hours in 15 inches of snow. Because of a lack of coordination and an inability to share information between first responders, various highway authority groups, and the city, more than 300 motorists were stranded in their cars overnight.
In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams.
The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.
This summer, more than one million Capital One clients had their information breached, furthering the financial sector’s infamous reputation of being the most breached industry with 35 percent of all data breaches.
More than 10 years ago, I was deployed to Iraq as a U.S. Air Force intelligence analyst, assigned to the Joint Special Operations Command (JSOC) Task Force with one clear objective: disrupt terrorist activities by targeting and capturing al-Qaeda insurgents.
In today’s dynamic environments, risk must be proactively managed. However, lack of sufficient intelligence can make it impossible to get ahead of threats and breaches. Fortunately, artificial intelligence (AI) has emerged as a valuable tool in augmenting physical security with a more proactive approach.
When budgeting for video surveillance cameras, there are multiple factors to consider that affect cost beyond the camera itself. It’s important to also know the cost of installation, and the cost to service or upgrade a unit in the future. While configuring a small number of cameras will likely have little impact on cost, the labor involved in installing and servicing hundreds of cameras can be significant. A modular approach to camera design is necessary to reduce the installation costs and long-term maintenance of such cameras.
Travel is constantly evolving and there always seem to be new, easier and efficient ways to conduct business while on-the-go. However, as the industry evolves, it’s important for travelers and businesses to stay up-to-date on new services and best practices to efficiently communicate with employees and ensure overall safety.
Artificial intelligence (AI) and machine learning (ML) are being heralded as a way to solve a wide range of problems in different industries and applications, such as reducing street traffic, improving online shopping, making life easier with voice-activated digital assistants, and more.