Active shooter incidents continue to occur around the world as the most disturbing type of a workplace violence incident.
April 1, 2014
Workplace violence incidents are not isolated to any one country, so global enterprises should maintain plans for active shooter or workplace violence events for each country of operations. Learn where to start with these top five universal recommendations.
A strong security infrastructure doesn’t always start with the technology, it starts with the blueprints – by working with architects and designers, security teams can build the best security plans before the bricks are even laid.
Now, new security protocols and a full year of planning and training guard the athletes, spectators and race course for the 2014 Boston Marathon. What did industry leaders take away from the incident?
After more than 10 months of careful planning for the 118th running of the Boston Marathon, Boston's hotels are gearing up for record occupancy and larger-than-ever crowds of spectators both in the city and along the 26.2 mile route. This year’s Boston Marathon will be held on April 21st.
Jamie Schare Friedland, the wife of carjacking victim Dustin Friedland, has filed a lawsuit against the owners of The Mall at Short Hills, claiming they put profits ahead of security at the mall.
Copper wire thefts from highway street lights have decreased over the past few months following a December plea for help, an Indiana Department of Transportation official said Thursday. Crews are crediting counter-theft measures put in place with the Indiana State Police.
The U.S. Supreme Court agreed to hear a case that could determine whether companies such as Amazon.com Inc. must pay workers for the time they spend waiting to clear security checks at the end of their work shifts.
If 2013 was the year for grappling with a slow economy, 2014 will be the year where security technology makes a resurgence, and not just for what it can do in the control room, but in a number of other ways. Here’s my prediction for nine critical physical security trends for 2014.