As ransomware continues to gain notoriety, cybercriminals are looking for more ways to get the most out of the malware that they develop. Similarly, other bad actors who may lack the necessary skills to develop malware themselves are looking for a way to get in on the action. This has led to an increase in ransomware-as-a-service (RaaS), a practice in which cybercriminals put their ransomware up for sale, where it is purchased and leveraged by other criminals who are technically unable to develop their own variants.
Organizations of every type and size are always looking to make more informed decisions. In order to do better and plan for the changing world, they want to have access to as much information as possible. And, rather than implementing a new information gathering system, many are looking to mine the data already being collected by their physical security systems.
By now, we’ve all heard how the citizens of Hawaii were awoken on Saturday, January 13th with a (thankfully erroneous) alert telling residents to take shelter because of an incoming ballistic missile.
While the investigations and government hearings will continue, now that we’re a couple of weeks removed from the event, it’s important to take a step back and use this opportunity to crystallize several mass notification best practices.
It’s a scenario that isn’t hard for security professionals to imagine: Someone spots a drone hovering inside your secure facility’s perimeter, over your event, or during your emergency response operation. The drone’s presence is at best a nuisance, and at worst, might damage people or property, or interfere with your principle mission. What options do you have?
As tragedies like Vegas, Orlando and Sandy Hook stay top of mind for Americans, venues of every size across the country should assess how they tackle the difficult questions raised when evaluating security concerns for their events.
Striving for consistent, around-the-clock video surveillance means needing to account for dynamic lighting conditions. Here are a few recently released security solutions on the market today.
Federal regulators have stepped up oversight of the security of the nation’s power utilities as they work to safeguard the grid from threats and incidents such as widespread, long-duration blackouts caused by digital saboteurs.
Contrary to belief, today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders, both malicious insiders and negligent insiders.