Engaging Multinational Police Women on Equality and Rights (EMPoWER), a project from the U.S. Department of Justice and the Department of State's Counterterrorism Bureau, aims to provide leadership opportunities for women in security.
To help reduce tragedies due to misogynistic extremism, such as the Hot Yoga Tallahassee attack, organizations should establish proactive safety programs and a multidisciplinary threat assessment program.
The emergency management report from Trust for America's Health, Ready or Not 2022: Protecting the Public's Health from Diseases, Disasters and Bioterrorism, ranks U.S. states in terms of their disaster preparedness.
Law enforcement veterans Captain Robert J. Finnegan, Sr., and Captain Edward W. Cobbs, Jr., have been named Chief Security/Safety Officer (CSO) and Chief of Police, respectively, at the Delaware River Port Authority (DRPA).
Business security leaders must understand the importance of their role in organizational resilience. To stay relevant and succeed in times of rapid change and increasing uncertainty, businesses can leverage digitization to manage risk and become more adaptable.
Social media influencers garner millions of followers and fans, but along with the fame come many security threats. The security and protection lessons learned by these cases can benefit any brand online today.
As access control threats evolve, so does the security technology needed to mitigate them. Artificial intelligence (AI)-powered analytics, glass partitions and other security tools can prevent threats to entrance security — read the top three access control trends now.
In February 2022, many historically Black colleges and universities (HBCUs) were targeted by bomb threats. Leaders of those institutions can now apply for campus safety grants to protect their communities from security threats.
The top five physical security threats in 2022 are workplace violence, crime/theft, natural disasters, biosecurity and remote work. How can enterprise security protect employees from the ever-growing complexity of physical security threats?