The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
As with any hospital or healthcare facility with expensive equipment, often on wheels to be easily moved around, it is easy for equipment to be misplaced at the Ohio State
New airport security rules took effect Monday at two major British airports that require selected passengers to undergo full body scans. If they refuse, they will not be allowed to
Just hours ago, the Washington, D.C., Metro Transit Police Department (MTPD) launched Blue TIDE -- Terrorism Identification and Deterrence Effort, which included about 50 MTPD officers conducting a major, high-visibility,
Special events seem to be in the crosshairs of security executives who are spending millions of dollars to protect their special activities from what CIA Director Panette suggested to Congress
The FBI and the North Carolina Bankers Association have joined forces to launch a new weapon to wage war on bank robbers. In December 2009, the FBI and NCBA unveiled
Bollards and barriers, pioneered at American diplomatic facilities overseas, are being installed at U.S. high rise office buildings and local government facilities. The aim: to diminish the chance of and
The Government Accounting Office (GAO) released the following report summary: The December 25, 2009, attempted bombing of flight 253 raised questions about the federal government's ability to protect the homeland
New research finds collisions are not declining in jurisdictions where bans are in effect. "The laws aren't reducing crashes, even though we know that such laws have reduced hand-held phone
Drivers of commercial trucks and buses are prohibited from texting under federal guidelines that the U.S. Transportation Secretary announced earlier this week. The prohibition is effective immediately. Truck and bus
Data breaches at U.S. companies attributed to malicious attacks and botnets doubled from 2008 to 2009 and cost substantially more than breaches caused by human negligence or system glitches, according