If there is anything the security industry has learned over the past few years, it’s that this industry is not static. There are constant changes in technology and threats which can range from worrying about a possible break-in to employee theft or protecting a facility, its assets and employees. Security professionals are having to stay up to date with the latest and greatest security system technologies and adapt existing solutions quickly in order to keep their assets and information safe.
Corporate culture has been the source of vigorous discussion and debate in leadership circles for decades. Despite the persistence of this discourse, we continue to struggle with a working definition of “corporate culture.” A recent article in Harvard Business Review offered that “cultural norms define what is encouraged, discouraged, accepted, or rejected within a group.” How might the cultural norms in an organization encourage an environment ripe for workplace violence?
CISO roles – both full-time and fractional – are on the rise. Their skills can help a growing organization enhance its security program, keep it on track, and guide in times of crisis and change. However, finding the right CISO can be tricky business, especially if this role is new to your organization. Here are the skills to look for when hiring your CISO.
The WannaCry ransomware attack that successfully targeted Merck is not the only cyberattack to which the pharmaceutical industry has fallen victim. As pharmaceutical and biotechnology companies move toward greater digitalization and the storage of more valuable data, their digital security practices become more and more critical.
The New Year brings the possibility of a fresh start, new ideas and goals, and hope for a better tomorrow. And never before has a year started out with such a large focus on how the future can be improved through the promise of technology.
The days of a security officer spending their shift watching a few rows of grainy video footage are long gone. Operators today are being asked to actively monitor events from hundreds of video cameras, while also overseeing countless alarms from other devices such as door readers, intrusion panels, perimeter detection sensors, building automation controls and more.
Most people in the physical security industry are familiar with the 5 Ds: deter, detect, delay, deny and defend. These principles seem universally applicable for facility or asset protection use cases. But what principles should we apply in areas of open public access?
There are several options to consider when it comes to analytics for video surveillance systems: deploy analytics on the edge, or “in-camera”; use a dedicated server; or use a hybrid approach which leverages both edge and server implementations.
With the rapid growth of business travelers, especially millennial business travelers, companies often find it difficult to manage travel safety, health and security of their employees. This rapid growth also brings changes to the diverse composition of a mobile workforce and the risks associated with it. As the modern workforce continues to grow, there is no one-size-fits all approach to answering questions surrounding workplace law and lesbian, gay, bisexual, transgender and queer or questioning (LGBTQ) employees.