This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Training videos can be both effective and fun if you have some imagination and are open to a different approach. The safety and security video that Kishwaukee College in Malta, Illinois, recently developed proves that point.
At some point during your career you will find yourself interacting with a search firm and/or a recruiter who has been assigned a project to fill a professional level security risk related role. This firm may or may not have a specialty security risk related practice and may or may not be a firm that you have ever heard of.
Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.
This year’s Most Influential is organized by five categories: Corporate Security Practitioners, Public Sector Security, University/Think Tanks, Cybersecurity and State/Local Government Security.
Employees traveling abroad often want to spend off-hours and weekends sightseeing, but that doesn’t mean that enterprises can lose track of them during that time.
ACCORDING TO THE 2014 Unisys Security Index, the top three individual concerns in the U.S. are identity theft, bankcard fraud and national security in relation to war or terrorism.
September 1, 2014
On the Internet security side, 37 percent of Americans are seriously concerned about the security of shopping or banking online.
While legislators have passed a multitude of statutes to aid in the protection of our economic interests pertaining to data systems – non-physical assets and privacy – frequently any course of action is still determined by the concept of monetary loss and treated as if someone was stealing or damaging physical assets, or as in the case of the Stored Communications Act (SCA), creating a statue that has been described as dense and confusing to even legal scholars.