It’s a scenario that isn’t hard for security professionals to imagine: Someone spots a drone hovering inside your secure facility’s perimeter, over your event, or during your emergency response operation. The drone’s presence is at best a nuisance, and at worst, might damage people or property, or interfere with your principle mission. What options do you have?
As tragedies like Vegas, Orlando and Sandy Hook stay top of mind for Americans, venues of every size across the country should assess how they tackle the difficult questions raised when evaluating security concerns for their events.
Striving for consistent, around-the-clock video surveillance means needing to account for dynamic lighting conditions. Here are a few recently released security solutions on the market today.
Federal regulators have stepped up oversight of the security of the nation’s power utilities as they work to safeguard the grid from threats and incidents such as widespread, long-duration blackouts caused by digital saboteurs.
Contrary to belief, today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders, both malicious insiders and negligent insiders.
In last month’s column I took you though the research process in preparing for the interviews of executives and other key functional leaders in the enterprise. Now that you are ready to start conducting interviews, it is important to have a core list of key questions that you will ask each interviewee, along with specific questions unique to their role or function.
Aside from your good name, what should you bring with you to your new employer? In today’s climate, the answer is adamantly not someone else’s intellectual property.
How difficult is it for a computer (or a complete stranger) to validate the true identity of a person they don’t know? Very difficult, it turns out, especially when others may be trying to imitate them.
With companies’ reputations and futures becoming more inherently tied to their cybersecurity efforts, Security magazine connected with Kevin Richards, managing director of North American Security and global lead for Security Strategy and Risk at Accenture, to discuss the outcomes of negligent cybersecurity oversight during mergers and acquisitions.
If you would love to upgrade or expand your security technology but are struggling to get the funding, I’d like to suggest a few strategies that could get your project the greenlight.