The number of women landing leading roles in the workforce has increased significantly over the last several years, requiring them to travel more frequently and boost productivity while doing so. Nearly half of today’s business travelers are female, and although this number grows year after year, employers continue to struggle with providing females with the proper tools and information needed to help ensure their safety while traveling for business.
If there is anything the security industry has learned over the past few years, it’s that this industry is not static. There are constant changes in technology and threats which can range from worrying about a possible break-in to employee theft or protecting a facility, its assets and employees. Security professionals are having to stay up to date with the latest and greatest security system technologies and adapt existing solutions quickly in order to keep their assets and information safe.
Corporate culture has been the source of vigorous discussion and debate in leadership circles for decades. Despite the persistence of this discourse, we continue to struggle with a working definition of “corporate culture.” A recent article in Harvard Business Review offered that “cultural norms define what is encouraged, discouraged, accepted, or rejected within a group.” How might the cultural norms in an organization encourage an environment ripe for workplace violence?
CISO roles – both full-time and fractional – are on the rise. Their skills can help a growing organization enhance its security program, keep it on track, and guide in times of crisis and change. However, finding the right CISO can be tricky business, especially if this role is new to your organization. Here are the skills to look for when hiring your CISO.
The WannaCry ransomware attack that successfully targeted Merck is not the only cyberattack to which the pharmaceutical industry has fallen victim. As pharmaceutical and biotechnology companies move toward greater digitalization and the storage of more valuable data, their digital security practices become more and more critical.
The New Year brings the possibility of a fresh start, new ideas and goals, and hope for a better tomorrow. And never before has a year started out with such a large focus on how the future can be improved through the promise of technology.
The days of a security officer spending their shift watching a few rows of grainy video footage are long gone. Operators today are being asked to actively monitor events from hundreds of video cameras, while also overseeing countless alarms from other devices such as door readers, intrusion panels, perimeter detection sensors, building automation controls and more.
It is becoming increasingly difficult for organizations to protect their mobile workforce as business travelers are vulnerable to new health and safety threats while traveling year after year.
Most people in the physical security industry are familiar with the 5 Ds: deter, detect, delay, deny and defend. These principles seem universally applicable for facility or asset protection use cases. But what principles should we apply in areas of open public access?
There are several options to consider when it comes to analytics for video surveillance systems: deploy analytics on the edge, or “in-camera”; use a dedicated server; or use a hybrid approach which leverages both edge and server implementations.