Organizations should ready a comprehensive ransomware preparedness strategy ahead of time that is adapted depending upon the severity of an attack. Here are four steps leadership should follow in developing a ransomware response strategy.
The Federal Bureau of Investigation (FBI) has designated 40 shootings in 2020 as active shooter incidents. Although 2020 witnessed the highest rate of active shooter incidents for the period 2000 to 2020, casualties were significantly lower. Here’s a breakdown of the FBI’s Active Shooter Incidents in the U.S. in 2020.
As the Global Security Exchange (GSX) nears, Security magazine has a roundup of some of the new security solutions to be displayed and demonstrated at the show.
August 13, 2021
As the Global Security Exchange (GSX) nears, Security magazine has a roundup of some of the new security solutions to be displayed and demonstrated at the show.
The healthcare organization based in Washington state has begun a journey of unifying its video surveillance and access control under one platform, yielding better situational awareness, streamlining investigations and providing an additional level of safety and security to staff and patients alike.
MultiCare Health System based in Washington State has begun a journey of unifying its video surveillance management and access control under one platform.
As with most other business, economic, and governmental sectors that are imperative to daily life, the energy sector is at risk from a variety of threats both cyber and physical. What can be done?
Remote desktop protocol or RDP has been used for years as a remote access solution, but the pandemic rush to work from home sent thousands of RDP users and RDP enabled machines outside the classic network perimeter. Is RDP dead?
As private enterprises and governments around the world look into vaccine passports for the future, security leaders must ensure that they are administered in the right way, so that we aren't taking away one problem and creating another.
Truly hardening a K-12 school system from gun violence requires a nuanced approach. Here’s how to use modern technologies and information to supplement a volunteer information approach, without all the noticeable security tech.