The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
iSecurity is an online event designed to put the information you need, the people you want to network with and the solution providers you want to hear from at
The Chicago Police Department is teaming with a local university to develop a system that predicts where crime will occur. According to the Chicago Sun-Times, the city’s police department, the
The Identity Theft Resource Center reports show that compromised data stores from healthcare organizations far outstrip other verticals this year. According to figures updated last week, healthcare organizations have disclosed
A 27-year-old suspect who concealed an embezzlement scheme in Kalamazoo for five years totaling $950,000 was sentenced to serve 41 months in prison for thievery. The woman who headed the
The Defense Department’s supply chain is vulnerable to the infiltration of counterfeit parts, potentially jeopardizing the lives of American soldiers, according to two Democratic senators. In an August 6 letter
Goodwin House, a continuing care retirement community in Virginia, wanted to provide additional security to its residents with a higher-tech but still user-friendly solution. With the help of access control
The Department of Homeland Security is quietly creating specialized teams of experts to test industrial control systems at U.S power plants for cybersecurity weaknesses. An August 4 Associate Press report
The embattled Federal Protective Service (FPS) should take steps to standardize building security measures at federal facilities by working with the tenants of those buildings to define structures, operations, and
A laser or “lighted object” was reported in the sky at O’Hare Airport as Air Force One was departing the night of August 5, an airport official said. The airport
Securities regulators in Pennsylvania and other states are warning investors to keep an eye out for “mutations of old schemes and themes” as con artists seek to profit from new