All colleges and universities have been ramping up their cybersecurity efforts during the past decade, but where do the trained professionals to meet their needs – and those of other industries – earn their credentials? Regent University has started providing an answer to that question during the past couple of years by building a state of the art “cyber range” on its Virginia Beach campus.
Sports venues for many years have been on the lookout for weapons like guns and knives at their entrance ways, and it would probably be very difficult for a bad actor to enter a stadium with a nuclear warhead.
The terrorist incident at the Ariana Grande concert in Manchester, United Kingdom, in May raised new questions of how arenas that house sporting events and other types of attractions such as concerts can ensure fan safety.
Hospitals are places for healing the sick and wounded, but unfortunately given their necessarily open nature they can be challenging environments to physically secure – potentially leading to additional medical emergencies.
Airport security personnel spend most of their time preparing for active shooter incidents, insider threats and, in concert with the federal Transportation Security Administration (TSA), potential terrorist attacks. But on January 28, many of our nation’s largest airports had to handle an entirely different, unaccustomed scenario: mass protests over immigration policy.
An inexplicable rise in organized retail crime during the past couple of years, perhaps due to police passivity, has major retailers looking to upgrade their equipment, technology, policies and procedures, and training for employees to combat loss prevention.
Agencies and authorities that provide water, wastewater and dam services don’t face the same regulatory hurdles as power utilities, but they’re also often smaller and have fewer resources, housed as they generally are within municipal governments or other smaller entities.
In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.