Stephanie Jaros, Director of Research for the U.S. Department of Defense’s (DoD) counter-insider threat program, talks to Security about the integration of the human and behavioral sciences into insider threat mitigation, as well as the criticality of the timeline when it comes to addressing such risks.
This month’s leadership columnist Mike Gips proposes a satirical alternative to the need for leadership prevailing in security today, taking inspiration from essayist Jonathan Swift and his “Modest” proposal for addressing food scarcity, malnourishment, blight and overpopulation within Ireland in the 1700s.
The British Standards Institute (BSI) has released the annual Supply Chain Risk Insights report, which analyzes BSI data from the organization's web-based intelligence system, Connect Screen.
There are several key attributes that any security or IT manager should consider before purchasing a video surveillance storage solution. Here's a checklist as you’re reviewing the market’s options to ensure your critical needs are addressed prior to purchasing.
Kinamo Lomon, who has over twenty years of law enforcement experience, has been named the Director of Operations for Princeton University's Department of Public Safety.
By using fingerprints or portraits to register citizens, biometric registries have the most significant utility in countries with unreliable or non-existent national ID systems. Let’s explore how biometric authentication works and can bring empowerment to populations worldwide.
An exit strategy is not necessarily top of mind if you are enjoying a successful security career. How do you start planning your exit strategy when you are no longer seeking professional advancement?
One of the insights that this year’s security leaders shared with us was which metrics their security programs and the C-suite find most valuable — and we found some overarching trends in this area.