The U.S. House of Representatives Intelligence Committee introduced legslation intended to enhance information sharing between private companies and intelligence agencies about cybersecurity threats.
Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.
Active shooter incidents continue to occur around the world as the most disturbing type of a workplace violence incident.
April 1, 2014
Workplace violence incidents are not isolated to any one country, so global enterprises should maintain plans for active shooter or workplace violence events for each country of operations. Learn where to start with these top five universal recommendations.
Operators in the room are on their phones, either receiving or relaying information about security – physical and cyber-related events. Welcome to Exelon’s Security Operations Center (ESOC), with three entities: the ESOC, the Incident Command Center (ICC) and the Cyber Security Operations Center (CSOC).
An independent security expert says that the NSA could turn iPhones into eavesdropping tools and use radar wave devices to harvest electronic information from computer even if they weren't online.