In a recent Security webinar, How You Can Turn Security Training and Awareness into Action, Pieter Danhieux, Co-Founder and CEO of Secure Code Warrior, says there are 111 billion lines of code written by an estimated 22 million developers every year. “Building code is like building a house. If you do everything well, you end up with a beautiful, modern and secure house,” says Danhieux.
From seed-to-sale, all activities that occur with each cannabis plant needs to be tracked and captured on security video, including the interaction between an employee and a plant. Even plant waste and dead plants must remain under surveillance at all times.
Vimeo, a video platform, has been accused of violating the Illinois Biometric Information Privacy Act (BIPA) for illegally storing, collecting and using individuals' biometric indentifiers and biometric information without written consent.
As municipalities continue to harden their frontline defenses against attacks on their IT infrastructure, one area that should not be overlooked are public-private partnerships, as these are prime targets for criminals and others.
Security manufacturers are providing mass notification and audio solutions to improve emergency response times during active shooter incidents and other emergency events.
Security officer services companies and the clients who employ them are trying their best to keep on top of quickly evolving video monitoring technology.
Last September, four mobile carriers (AT&T, Sprint, T-Mobile and Verizon) announced Project Verify, a way to log into apps without making a new account or password by instead relying on smartphones to authenticate identities.
Meet Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at the Exelon Corporation.
How is Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at Exelon Corporation, mitigating and managing risk on a daily basis?