Round1 Entertainment, a multi-entertainment facility offering bowling, arcade games, billiards, karaoke and other activities in an indoor facility complex upgrades its video surveillance solution to deal with not only internal and external thefts, but injury claims as well.
With hurricane season quickly approaching us, it gives us a chance to stop and think about how well prepared we are for disasters of all kinds. A solid, well-tested disaster recovery (DR) plan is the difference between your company surviving a natural disaster – or ceasing to exist the moment it happens.
To keep up with security vulnerabilities, organizations need to break the trade-off between security and convenience. Come take a deeper dive into how behavioral analytics can secure your organization.
The Cybersecurity and Geopolitical podcast returns with Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza taking a sweeping look at some of the main protagonists on the global stage right now: Russia, China, Iran and North Korea. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape.
A report published by the U.S. Government Accountability Office (GAO) details how federal agencies currently use, and plan to expand their use of, facial recognition systems.
Heath Anderson, Director of Information Security and Technology at LogicGate, discusses how to build business and operational resiliency with a governance, risk management and compliance (GRC) program.
Lone wolf actors often leave clues about their intentions through several stages of the attack cycle. For corporate security executives, using data and protective intelligence to identify these clues is crucial for mitigation and prevention.
As violence and shooting within Chicago-area expressways continues to increase year-over-year, the Governor, Illinois Department of Transportation, Chicago Department of Transportation and Illinois State Police will install 200 cameras in surrounding expressways to help solve crimes.
We can strive to control criminal activities targeting vessels, vehicles, storage facilities and the people involved in the movement of goods. Existing security protocols and technologies can help protect the supply chain from theft by local gangs to international criminal organizations.
For years, the access technologies industry has helped businesses ensure their facilities function at optimal efficiency, and innovations in the space are opening the door to even greater business benefits.