Luxembourg Airport will increase security at their border control system by adding a pre-registration option, mobile screening and biometric identity management. Read more about the entry-exit system from Veridos in this case study.
As many have seen, the Log4Shell vulnerability, which was discovered over the weekend, is an extremely serious flaw and will likely impact organizations for years to come. Here’s what we know thus far, and how enterprises can remain safe as this vulnerability persists.
The first step in creating a complete data security plan is to know what types of data the company collects, where it is stored, and with whom and how it is shared. Next, the business should determine the potential risks to that data and whether the information resides in electronic or physical form (or both).
The Museum of the Bible adapted their access control system to suit the new restrictions caused by the COVID-19 pandemic, adopting a system from Qylur. Check out the physical security case study here.
Andhra Pradesh, an Indian state with over 55 million residents, is home to a centralized governance and security center. A video management system from Videonetics helps secure the area.
The International Foundation for Protection Officers (IFPO)'s new report, "The Competence of Frontline Workers and What They Say About Their Work," explores the typical responsibilities, skills and perceptions of the dynamic security officer role.
Check out five tips on how to execute a successful ransomware tabletop exercise, including how to identify key participants and ensure representatives from core business and operations teams are involved.
If hackers can learn the ins and outs of your network, shouldn’t you beat them to the punch by obtaining deeper visibility and holistic mapping of your network infrastructure and attached applications, services, and devices?