This week’s multiple terror attacks in Brussels resulting in over thirty killed and more than 250 injured raises again the specter of terrorism globally.
Tracking metrics often relies on tracking reports. Use these tips to build a first-class incident report writing handbook to better manage security resources.
Last week’s horrific Islamic State-linked terrorist attacks in Paris illustrate another troubling phenomenon: family-affiliated terrorist activities occurring globally.
Has investigative reporting turned against the security officer? According to Mark Fidelman, biases embedded in news reports can give your security team an undeserved bad reputation.
From an executive-level perspective, the greatest shift in cybersecurity relates to the focus and the responsibility – moving from strictly an “IT issue” to one of a business function. Look no further than the Target breach and the subsequent resignations of the company’s CEO and CIO to see how cybersecurity has escalated to the C-suite. This was unprecedented 15 years ago, when the primary cybersecurity role of IT was information assurance. So why has the philosophy changed?
Today, as we remember the terrible events of the morning of September 11, 2001, the staff of Security magazine is considering how far we have come, and how far we have left to go.
Having Lock-Down Protocols are useful, however it can delay law enforcement’s entry time. Do not expect to always escort law enforcement to threat areas; directions and diagrams are very helpful.
Three U.S. naturalized citizens of Somali descent undertook suicide bombings in Somali on behalf of the Somali terror group al Shabaab. The concern is that U.S.-based individuals would fight in Syria, return to the United States, and participate in a terror attack on U.S. soil.