The University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) had opened its Sport Security Research, Training and Operations Center at the National Sport Security Laboratory (NSSL) for addressing sport safety and security risks and threats.
There are a number of legislative committees and groups working on counter drone legislation, evaluating existing technology and supporting the development of new technology. Here are some of the major highlights in counter drone research and legislation since the early 2000s.
It’s not working, but it can. Despite government and private sector efforts to retain more women in the global cybersecurity profession, women are sorely underrepresented in the industry.
As a leader, you get very few opportunities to create a culture of discipline around the goals and vision for your team. Over the last few years, this core leadership trait of “engagement” has become an imperative. How can you invite your employees into your vision and mission and have them make it their own?
Firms supplying essential services, e.g. for energy, transport, banking and health, or digital ones, such as search engines and cloud services, will have to improve their ability to withstand cyberattacks under the first EU-wide rules on cybersecurity.
Details of more than 18,000 Foreign Terrorist Fighters have now been shared via Interpol’s network with an increasing amount being sourced from the conflict zones. Biometric data such as photos, fingerprints and DNA profiles have already led to the positive identification of terrorists around the world, including via facial recognition.
The International Organization for Migration is working on introducing a Regional Biometric Data Exchange Solution (RBDES) to countries around the world in an effort to address irregular migration.
The RBDES will enable law enforcement agencies to exchange biometrics data in a fast and secure way to verify the identities of travelers at borders. The system does not however store biometric data.
Only about half of all countries have a cybersecurity strategy or are in the process of developing one, the International Telecommunication Union reported in its second Global Cybersecurity Index.
China is to use quantum cryptography to create an “unhackable” communications network. Using the network, some 200 users from the military, government, finance and electricity sectors will be able to send messages without the concern that others may be able to read them.