The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Military, DHS, healthcare security and hospital medical staff just conducted a training exercise specific to a dirty bomb attack related to the upcoming NATO meeting in Chicago.
About 40,000 Minnesota residents will go to their mailboxes Sunday, May 6, for a rare delivery: an empty pill bottle representing a powerful antibiotic that would be delivered in the event of a bioterrorism attack. More than 300 mail carriers will participate in the test, fanning out across four neighborhoods
Cruise ship industry institutes new security and safety rules, including more physical access controls, after accident in which captain is still under house arrest.
More than 26%, or one in four, of the nation’s bridges are either structurally deficient or functionally obsolete. While some progress has been made in recent years to reduce the number of deficient and obsolete bridges in rural areas, the number in urban areas is rising.
If you are still somewhat in the dark as to how to move forward with cloud computing, don’t feel so bad. Even high-tech companies are still fumbling their way along with the new cloud business model.
Decision based system collects information from disparate systems to help minimize risk, enhance operational efficiencies and improve patient satisfaction.