Whether it's fever detection or no-touch visitor management, what are some new solutions that may help protect an enterprise's assets and properties during COVID-19?
A new report, COVID-19, Conspiracy and Contagious Sedition: A Case Study on the Militia-Sphere, details how the Militia-sphere’s messaging has grown increasingly extreme as the pandemic has progressed, to the point of threatening and enacting violent attacks.
What are seven concrete steps you can put in place to address visitor management in this crisis situation and during your recovery phase for re-entry to the office?
Video surveillance systems have always been vulnerable to attacks. Ever since IP technology was first introduced, security cameras have been an attractive target for hackers.
Arkansas Governor Asa Hutchinson announced the creation of a task force to study and analyze best practices and procedures for recruiting, training and maintaining law enforcement officers in the state.
The Internet of Things (IoT) continues to be a driving force behind smart buildings, with the ability to optimize all areas of building operations – from HVAC to surveillance, offering massive potential for facility owners and system integrators to create added value for customers. While goals such as reducing energy consumption and space utilization are still priorities, building owners and operators are searching for solutions to help make workspaces and common areas safe and useable, abiding by new health and safety guidelines. Security professionals are also searching for ways to leverage and augment their technology infrastructure to contribute to the overall safety of their facility, beyond the traditional capabilities of access control and surveillance.
A veto-proof majority of Minneapolis, Minn. City Council members announced their commitment to disband the city’s police department and invest in community-led public safety measures, according to a report by The Appeal.
The city of Chicago will spend up to $1.2 million to hire three private security firms to help prevent civil unrest and looting that erupted amid protests over the killing of George Floyd.
The rapid growth of extremist groups poses many challenges to enterprise security. How has social media and the Internet provided radical groups the means to spread their ideologies and what are the challenges with identifying and countering these groups?