Vermont Governor Phil Scott announced that 69 public, private and independent schools across Vermont have been awarded funds to make safety improvements to school infrastructure.
To help meet demands of metal detectors in the entrances of schools, airports, houses of worship and correctional facilities, the National Institute of Standards and Technology has researched and developed four new metal detection testing standards.
As we have done in previous years, the Security magazine team compiled our favorite articles from this year. As we head into 2020, we hope you take a moment to review some of 2019’s top articles about lessons learned, thought leadership, security challenges and good practices.
Physical security is continually evolving. New technologies emerge every year, and devices that have been around for decades — from smoke detectors to IP cameras — become more advanced in order to meet the demands of the new security landscape. But as we take part in this progression and strive to leverage the latest and greatest devices, it’s important to never forget one of the core technologies of the security industry: video.
The International Society of Automation (ISA), a globally recognized authority for industrial automation training since 1945, and the University of Akron, an influential public research university in the region, have entered into a workforce training agreement to offer the ISA IEC62443 Cybersecurity Training and Certificate program in Akron.
On October 10, 2019, the California Attorney General's office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. What are they, and what should enterprises do to achieve compliance and avoid costly fines?
On October 10, 2019, the California Attorney General’s (AG) office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. The AG’s office also announced that it will hold public hearings on the regulations on December 2-5.
Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.