Security's Editorial Advisory Board member Dean Alexander, an author of several books on terrorism and a Western Illinois University School of Law Enforcement professor and director of the WIU Homeland Security Research Program, will be a part of a training program for more than 60 new incoming Illinois police chiefs through the Illinois Law Enforcement Training and Standards Board Executive Institute.
Dr. Stacey A. Hall, Professor of Sport Management at The University of Southern Mississippi (USM), has been named the new director of USM’s National Center for Spectator Sports Safety and Security (NCS4).
All of these issues organizations are dealing with at the same time are threatening corporate security and the safety of our employees and executives. To address these situations, we need to know what steps we can take - and take quickly - to ensure our clients are safe and their business operations continue through these exceedingly complicated times.
Defending against insider threats is one of the biggest challenges an organization can face, and the COVID-19 pandemic has only made detection more challenging as remote employees continue to use virtual private networks (VPNs) to access sensitive company files and information. Here, we talk to Carolyn Crandall, Chief Deception Officer at Attivo Networks, to discuss how security teams can use deception technology to detect and prevent insider threat attacks.
While traditionally seen solely as a private problem, domestic violence has the potential to significantly impact workplace safety and productivity, and as the line of work-home-life balance continues to blur for many during COVID-19, companies should be on top of their domestic violence response plans to aid and support employees.
The Security Industry Associated has identified its Top 10 Security Megatrends from focus groups within the industry. The trends will be an underlying theme at the Securing New Ground conference (Oct. 21-22, virtual).
Financial services institutions and banks around the globe face monumental challenges as they look to streamline service delivery for customer transactions, manage multi-party loan processes, collaborate on industry benchmarks and indices, and eliminate fraud and cybercrime. Historically the market has primarily relied upon manual approaches for sharing and managing transaction data. But advances in confidential computing (sometimes called CC or trusted computing), combined with federated machine learning (FML), are helping financial organizations better share data and outcomes, while alleviating many privacy and security concerns.
Artificial intelligence (AI) is now a major priority for government and defense worldwide — one that some countries, such as China and Russia, consider the new global arms race. AI has the potential to support a number of national and international security initiatives, from cybersecurity to logistics and counter-terrorism.
While the concept of Zero Trust was created 10 years ago, the events of 2020 have thrust it to the top of enterprise security agendas. How should organizations go about applying the Zero Trust blueprint to address their new and complex network reality? These five steps represent the most logical way to achieve Zero-Trust networking.
Security professionals responsible for people screening at outdoor venues, theme parks, warehouse/logistics centers, schools, museums, houses of worship and other public places, all agree on one thing — there will be no going back to the old invasive, analog methods of security screening such as metal detectors, wands and pat downs. The future of people screening must be touchless and digital in order to deal with the realities of today’s threats from weapons and viruses, while preparing for those that will come our way in the future. Meet Peter George, Chief Executive Officer, Evolv Technology, who believes that physical security is where cybersecurity was more than 15 years ago and is now entering a similar transition.