As tragedies like Vegas, Orlando and Sandy Hook stay top of mind for Americans, venues of every size across the country should assess how they tackle the difficult questions raised when evaluating security concerns for their events.
Striving for consistent, around-the-clock video surveillance means needing to account for dynamic lighting conditions. Here are a few recently released security solutions on the market today.
Federal regulators have stepped up oversight of the security of the nation’s power utilities as they work to safeguard the grid from threats and incidents such as widespread, long-duration blackouts caused by digital saboteurs.
Contrary to belief, today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders, both malicious insiders and negligent insiders.
In last month’s column I took you though the research process in preparing for the interviews of executives and other key functional leaders in the enterprise. Now that you are ready to start conducting interviews, it is important to have a core list of key questions that you will ask each interviewee, along with specific questions unique to their role or function.
Aside from your good name, what should you bring with you to your new employer? In today’s climate, the answer is adamantly not someone else’s intellectual property.
How difficult is it for a computer (or a complete stranger) to validate the true identity of a person they don’t know? Very difficult, it turns out, especially when others may be trying to imitate them.
With companies’ reputations and futures becoming more inherently tied to their cybersecurity efforts, Security magazine connected with Kevin Richards, managing director of North American Security and global lead for Security Strategy and Risk at Accenture, to discuss the outcomes of negligent cybersecurity oversight during mergers and acquisitions.
If you would love to upgrade or expand your security technology but are struggling to get the funding, I’d like to suggest a few strategies that could get your project the greenlight.
Today, cybersecurity is on all our minds. Every other day, we get news of another cyberattack. As more organizations struggle to keep up with the onslaught of these new threats, many are asking: “What can we do to strengthen our cybersecurity posture?” When we want to quantify it, consider the concept of risk. In its simplest form, the risk associated with a system is the impact of it malfunctioning, multiplied by the likelihood that a malfunction will occur.