Washington bans assault weapons sales Security Staff April 28, 2023 New gun legislation was signed into law in Washington State that prohibits the sale, manufacture and import of assault weapons with some exceptions.Read More
New DHS task force will use AI to mitigate threats Security Staff April 28, 2023 The DHS announced an artificial intelligence task force designed to use the technology to address emerging threats to national security.Read More
Delaware hospital cited by OSHA for failing to stop workplace violence Security Staff April 28, 2023 After an OSHA investigation, a federal judge ruled that UHS of Delaware and UHS of Fuller had exposed Fuller Hospital employees to workplace violence.Read More
Waging war on wildfires with technology Josh Lewis April 28, 2023 As wildfire season approaches again, fire departments around the country are gearing up for the fight with the tech industry supporting them. Read More
Preventing device failure: Building a foundation for success Wayne Dorris April 28, 2023 Now more than ever, reliable security systems require proactive device maintenance and lifecycle management to ensure continuous video coverage. Read More
Strengthen mail security to better protect public figures Will Plummer April 28, 2023 Security leaders have to be prepared for mail-based threats and doxxing, posting someone's address online, that may target public figures. Read More
2022 saw fewer recovered fraudulent fund transfers Security Staff April 27, 2023 A new incident response report analyzing data breach statistics found that the number of incidents was almost identical in 2022 and 2021.Read More
81 percent of South Africans think banks need better fraud detection Security Staff April 27, 2023 South Africans expressed financial scam concerns in a recent FICO survey showing a shift in users trust in banks depending on their scam response. Read More
46 percent of organizations faced synthetic identity fraud in 2022 Security Staff April 27, 2023 New AI technologies have raised a number of security concerns as artificially created audio and video makes it easier to commit identity fraud. Read More
Strengthening the cyber risk lifecycle Mayuresh Ektare April 27, 2023 Cloud-native applications in the business landscape has helped streamline operations. But, using the cloud also expands a business’s exploitable attack surface. Read More