To help meet demands of metal detectors in the entrances of schools, airports, houses of worship and correctional facilities, the National Institute of Standards and Technology has researched and developed four new metal detection testing standards.
On October 10, 2019, the California Attorney General's office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. What are they, and what should enterprises do to achieve compliance and avoid costly fines?
On October 10, 2019, the California Attorney General’s (AG) office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. The AG’s office also announced that it will hold public hearings on the regulations on December 2-5.
To remedy the cybersecurity skills gap and fight data breaches, enterprises across the world are looking overseas. How can public-private partnerships help resolve the industry-wide issue?
The Cybersecurity and Infrastructure Security Agency (CISA) recently published an alert on the Dridex malware, as the result of recent collaboration between the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) to identify and share information with the financial services sector.
How does Hector Rodriguez, Director of Public Safety and Security at Marymount California University, secure the campus, residential areas, staff members and students?
Corporations, universities and other institutions have faced the question of whether to outsource or not to outsource for decades when it comes to physical security and more recently on the cybersecurity side. What is the correct answer to this question?
What is a Defense-in-Depth strategy, and why has it come to be acknowledged as Expense-in-Depth? How can CISO's communicate the business value of this strategy?
As you advance your security career into senior and executive levels, occasions may arise where your personal values may conflict with those in the organization. How will you handle ethical challenges that may have career and life-long impacts?
Recent California wildfires have challenged enterprise security professionals who are responsible for protecting and managing emergency evacuations. How can enterprise security professionals leverage their existing security hardware and software investments to better prepare for emergencies?