In the 2021 annual Access Control Trends Review, there has been a significant increase in businesses using their smartphone as their key, 64% more than last year. In addition, data shows most people have returned or will return to the office soon, by September 2021.
By reimagining access control and use of existing system data, Yale’s Public Safety Systems and Services team was able to centralize and organize security technology operations, while providing further value across the entire university.
Once Yale University closed due to the pandemic in March 2020, the Public Safety Systems and Services team quickly realized that they could change the way access control was used and programmed across campus, while also streamlining security and operations.
Marc Barbiere came to Georgetown about five months before the COVID-19 pandemic, taking over the recently-restructured Office of Emergency Management (OEM) in order to coordinate the University’s efforts to prepare for, respond to, and recover from emergencies.
Marc Barbiere came to Georgetown about five months before the COVID-19 pandemic struck with the goal of providing a robust framework for the University to prepare for, respond to, and recover from emergencies. Barbiere and the newly restructured Office of Emergency Management put together a framework to streamline and organize emergency and pandemic response to continue operations no matter the cause of disruption.
The cybersecurity industry is in the midst of a skills crisis. With a cyberattack occurring approximately every 39 seconds, every business needs a well-trained staff to protect it. How can the void be filled? Artificial intelligence (AI). It’s one of the best hopes for the industry and has the potential to ease the pressures of the security skills shortage.
It’s important that businesses understand that DDoS attacks aren’t just a blip on the radar; if not handled properly, they can be devastating to the long-term prospects of a business.
While it’s true that ethics and conduct are matters under the control of humans, financial companies and other entities also have ethical responsibilities, typically enshrined into a corporate code of conduct. When corporate principles aren’t adhered to, and unethical behavior becomes the norm, disaster can ensue.
As technology grows and advances, potential cyber threats grow with it. While this notion is nothing new, the current speed of innovation makes it more important than ever to consider the implications these developments will have on our cybersecurity capabilities — especially with cybercriminals becoming more sophisticated and more adept at using emerging blind spots to their advantage.
Awards season is upon us. Next month, this very magazine will present its Most Influential People in Security. Later in September of this year, at GSX in Orlando, U.S. security managers, consultants, officers, manufacturers and others will learn whether OSPA's judges have tapped them for an Outstanding Security Performance Award.
Calculating your worth during a job search should be an informed exercise done before interviews start. While a good understanding of the value of your background and experience is critical, it is also important to have some knowledge of the compensation structure of any companies you would like to work for.