From seed-to-sale, all activities that occur with each cannabis plant needs to be tracked and captured on security video, including the interaction between an employee and a plant. Even plant waste and dead plants must remain under surveillance at all times.
Vimeo, a video platform, has been accused of violating the Illinois Biometric Information Privacy Act (BIPA) for illegally storing, collecting and using individuals' biometric indentifiers and biometric information without written consent.
As municipalities continue to harden their frontline defenses against attacks on their IT infrastructure, one area that should not be overlooked are public-private partnerships, as these are prime targets for criminals and others.
Security manufacturers are providing mass notification and audio solutions to improve emergency response times during active shooter incidents and other emergency events.
Security officer services companies and the clients who employ them are trying their best to keep on top of quickly evolving video monitoring technology.
Last September, four mobile carriers (AT&T, Sprint, T-Mobile and Verizon) announced Project Verify, a way to log into apps without making a new account or password by instead relying on smartphones to authenticate identities.
Meet Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at the Exelon Corporation.
How is Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at Exelon Corporation, mitigating and managing risk on a daily basis?
While VR and AR have different fortes, both enhance and accelerate experiential learning that can help manifest and reinforce a culture of cybersecurity across industries. It is technology implications like this that will help propel cybersecurity awareness into a state of mass awareness.
An emerging challenge facing security leaders involves governance related to the collection, storage and transmission of personal information and the ethical utilization of it. While there are compliance programs currently in place that govern the protection of individual medical and financial data, there are clearly additional challenges on the horizon.