What makes a quality security guard? What skills and traits embody someone that you would want to entrust with your life or the lives of your family? Most fail to realize that so much more goes into the making of a true professional protection agent than just an intimidating look and a gun. There is certainly more to it than the minimum standards required for licensure.
Ready or not, cloud is already making its impact on the industry. While it’s not a new technology to the industry, it continues to see growth, driven by growing possibilities in the IoT space. Security end users and their organizations are shifting to truly embrace the cloud, with worldwide spending on public cloud services and infrastructure forecasted to reach $210 billion in 2019 – an increase of 24 percent over 2018. Cloud services can provide benefits not only to large enterprise organizations, but small and mid-sized businesses as well by providing cost-effective solutions and increased flexibility.
Acting Secretary of Homeland Security Chad F. Wolf announced changes to the FY2019 Staffing for Adequate Fire and Emergency Response (SAFER) Grant program that would allow more firefighting organizations to take advantage of the grants.
The Metropolitan Transportation Authority (MTA) announced an ultraviolet (UV) light pilot program that reportedly kills COVID-19, with the first phase set to launch on subways, buses and other New York City Transit facilities throughout the system this week.
The risks of an attack are not new, but as incidents become more sophisticated and persistent, organizations need to move from cybersecurity to cyber resilience.
The Institute for Critical Infrastructure Technology (ICIT), a nonprofit cybersecurity and technology think tank, named Joyce Hunter as Executive Director.
CISA released the Identity, Credential and Access Management (ICAM) Pilot for Public Safety overview fact sheet to introduce ICAM and provide high-level observations from two 2019 public-safety focused ICAM Demonstrations.
When we do a risk assessment, we evaluate the facility’s needs and identify any gaps in their physical security barriers and policies and procedures. Why should you integrate security early in the design process?