Now more than ever, government policy makers need to focus resources; allowing law enforcement to focus on the core duties and responsibilities of law enforcement officers. And industries like ours, need to be creative in developing solutions to support them in this effort. The physical security industry supports law enforcement and when private security works in partnership with law enforcement, police officers have more time to focus on preventing and solving crimes.
SB 785 passed this week in the Senate and includes programs for post-traumatic growth, access to alternative therapies, as well as a grant of up $750K going to state and local organizations that provide suicide prevention services to veterans and their families.
The 2020 Cybersecurity Perception Study finds most people still don’t view cybersecurity as a career field for themselves, even as nearly one-third (29%) of respondents say they are considering a career change.
Kauai's original hotel bubble involving several island resorts for COVID-19 safety has been put to the side after Gov. David Ige’s announced this week that as of Oct. 15 Hawaii will start admitting trans-Pacific travelers who record one negative COVID-19 test within three days of arrival, eliminating the need for resort bubbles. However, at least two high-end Kauai resorts will move ahead with establishing themselves as “bubble” hotels despite the Governor's decision.
The U.S. Marshals Service, charged with moving prisoners around the nation, released a request for quotes to build a facial recognition tool into its agents’ smart devices to help identify prisoners during transfer.
The term "Kill Chain Methodology" or "Cyber Kill Chain" has been widely used in the world of cybersecurity to interpret the different stages involved in a cyberattack. In a nutshell, from a hacker's perspective, a kill chain is a way to illegally gain access to a network or network device via a series of progressive steps. Consequently, from a defender's perspective, every stage of this process presents an opportunity to prevent intrusions. So, what kind of systems, networks or devices can hackers exploit by employing this methodology? Let's talk about the election.
Illegal dumping is a problem in many cities around the world and enforcing laws to prevent it can be quite difficult and resource-intensive. New Orleans has taken a technology-based approach to tackling the problem, and it's working.
The Hamilton County Election Commission in Tennessee plans to utilize money from the Federal Cares Act to focus on physical security in time for the November election.