In today’s world, where any energy organization can be a target for cyberattack, secure network architecture and end-to-end visibility are the building blocks to a resilient cybersecurity posture.
The Ronald McDonald House Charities of Central Texas implemented a cloud video surveillance system from Eagle Eye Networks to improve operational efficiencies. Learn more in this case study.
The Occupational Safety and Health Administration (OSHA)'s "Weekend Work" initiative will conduct construction site safety inspections on weekends, when security supervision may be more lax.
The U.S. Department of Energy (DOE) Office of Cybersecurity, Energy Security and Emergency Response (CESER) has released version 2.1 of the Cybersecurity Capability Maturity Model (C2M2).
Smart city technologies and urban big data produce data privacy concerns. For any data-driven smart city project to be successful, it must communicate its value and data safety to its primary stakeholders — the citizens.
For corporations who can’t fill the vital cybersecurity and forensic positions, the highest cost lies in timeliness: they can’t afford delays in responding to incidents or breaches. Digital forensic tools with automation capabilities may be the answer.
As cyberattack methods evolve, so too must enterprise incident response plans. How an organization recovers from a data breach is critical to their future business success.
In his new role at the University of Alabama at Birmingham, Daryl Green will oversee UAB Police and Public Safety’s team of 204 law enforcement, security, and emergency management personnel.