American Security Drone Act of 2021 The American Security Drone Act of 2021, formerly introduced as the American Security Drone Act of 2019, was given new life in January 2021 with bipartisan support and now incorporates drone detection and mitigation systems, not just drones. Here are five questions you can ask RF-based technology vendors to determine if they are in compliance with the federal advisory or could be banned by the American Security Drone Act of 2021 for security and cybersecurity reasons.
Being responsible for making the right decision on your entrance solution can be a challenge. Not only is it a considerable initial financial investment, but also you are responsible for the safety and customer experience of the building occupants themselves.
So, all that being said, what do most security professionals consider the essentials for selection and installation of a security entrance? In this article we will discuss the top seven factors to consider when investing in a security entrance solution.
Though many of us in the security industry are well-versed in the value of emergency mass notification technology, we have entered what is arguably this sector’s most significant era, as it plays a central role in the largest public health initiative in modern times. Now more than ever, organizations need to take a closer look at their critical communications practices to ensure they foster operational resilience and efficiency.
The risks that come with having an ineffective lockdown plan became painfully evident following the events at the U.S. Capitol building on Jan. 6. While the people inside the building were ushered to safety, the building itself was breached and overrun resulting in theft, building damage, injury and even death. It was clear that while the notification side of an emergency plan can be useful, its effectiveness only goes so far if it is not working in tandem with other physical security measures.
We asked several Women Security Leaders to tell us what drew them into the profession, along with their thoughts on continued diversification of the industry.
The Unofficial Law of Endpoint Security Proportionality: The security measures taken to protect an employee’s endpoint are proportionate to the proximity of the employee to the company’s most valued assets. Or, put in simpler terms, the more closely an employee works with a company’s crown jewels, the more essential it is to virtually eliminate the possibility of an endpoint security breach.
GroupSense’s director of intelligence operations Bryce Webster-Jacobsen outlines the U.S. Department of Defense’s Cybersecurity Maturity Model Certification’s Impact on Defense Contractors.
In order to combat cybersecurity threats, the Biden administration and state governors across the country should immediately work to foster deeper relationships with the private sector. Tech and government certainly don’t always get along, but the threats we face now require a national effort that would rival the Space Race of the 1960s. This can be done through state and federal governments offering financial incentives to businesses that prioritize the development and integration of cybersecurity measures, amplified communication from the government concerning the importance of cybersecurity, as well as the potential bolstering of compliance standards to minimize threats and the negative impact of breaches.
The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to detect runtime environments or sense detection attempts. Early actions were primitive compared to what we know today, but they laid the groundwork for more critical thought about adaptive and evasive technologies and sophisticated situational awareness. This lethal combination of research and deep targeting is likely the future of malware as adversaries attempt to outsmart the companies and researchers trying to thwart them.
With the inception of privacy regulatory laws and associated penalties, it has become mandatory for organizations to take necessary steps in establishing and implementing a strong privacy risk management framework. Inadequate, or the lack of, a risk management framework may present numerous organizational risks.