Applicable to both private and public sectors, the Standard provides a methodology to evaluate and respond to a spectrum of threats to tangible and intangible assets on both a domestic and global basis, according to an ASIS.
NJ state casino regulators canceled a poker match and ordered all prize money frozen until an investigation is complete on whether counterfeit poker chips were used.
The Cisco 2014 Annual Security Report reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks have reached startling levels.
Federal, state and local law enforcement agencies are increasingly borrowing border-patrol drones for domestic surveillance operations, according to flight logs recently released in response to a Freedom of Information Act lawsuit filed by the Electronic Frontier Foundation, a civil-liberties group.
Northwestern University police are creating a Community Emergency Response Team program to train volunteers in emergency preparedness in an effort to enhance campus safety and security.
American telephone metadata was only found to have played a role in initiating 1.8 percent of investigations, with a total contribution from NSA surveillance to investigations coming to 7.5 percent of cases. Traditional investigative methods (informants, community tips, targeted intelligence) provided 59.6 percent of impetus for those investigations, the report states.