The U.K.-based Transparency International Defence and Security Programme has released the findings of its Government Defence Integrity Index (GDI), which measures the risk of corruption in state defense and security.
Disaster recovery experts can learn many lessons from the events of Hurricane Ida, including focusing on preparation, infrastructure and far-reaching effects of storms.
Stephanie Jaros, Director of Research for the U.S. Department of Defense’s (DoD) counter-insider threat program, talks to Security about the integration of the human and behavioral sciences into insider threat mitigation, as well as the criticality of the timeline when it comes to addressing such risks.
This month’s leadership columnist Mike Gips proposes a satirical alternative to the need for leadership prevailing in security today, taking inspiration from essayist Jonathan Swift and his “Modest” proposal for addressing food scarcity, malnourishment, blight and overpopulation within Ireland in the 1700s.
The British Standards Institute (BSI) has released the annual Supply Chain Risk Insights report, which analyzes BSI data from the organization's web-based intelligence system, Connect Screen.
There are several key attributes that any security or IT manager should consider before purchasing a video surveillance storage solution. Here's a checklist as you’re reviewing the market’s options to ensure your critical needs are addressed prior to purchasing.
Kinamo Lomon, who has over twenty years of law enforcement experience, has been named the Director of Operations for Princeton University's Department of Public Safety.
By using fingerprints or portraits to register citizens, biometric registries have the most significant utility in countries with unreliable or non-existent national ID systems. Let’s explore how biometric authentication works and can bring empowerment to populations worldwide.