The Cybersecurity and Infrastructure Security Agency (CISA) and government and industry members of the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force released an annual report on its progress to advance meaningful partnerships and analysis around supply chain security and resilience.
The World Economic Forum today launched a new report that outlines how organizational leaders can influence their companies and encourage the responsible use of technology and build ethical capacity. “Ethics by Design” – An Organizational Approach to Responsible Use of Technology integrates psychology and behavioral economics findings from interviews and surveys with international business leaders. It aims to shape decisions to prompt better and more ethical behaviors. The report promotes an approach that focuses less on individual “bad apples” and more on the “barrel”, the environments that can lead people to engage in behaviors contrary to their moral compass. The report outlines steps and makes recommendations that have proven more effective than conventional incentives such as compliance training, financial compensation or penalties.
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, upgraded its analog legacy system to a smart video security solution for securing 12 train depots, including five unmanned locations, against theft and intrusion.
Recognizing that medical first responders are experiencing unrelenting stress as the COVID-19 pandemic continues to fill hospitals to near capacity, Elite Detection K9 (EDK9), which breeds, raises and trains scent-detection dogs, found a way to bring some puppy love to these tireless and dedicated health care professionals.
During the 2020 presidential election, Maryland’s Anne Arundel County Board of Elections partnered with a provider of cloud-based video surveillance and analytics to provide live, 24-7 video surveillance for 32 ballot boxes throughout the county to deter nefarious activities.
CISA, MITRE, and GMU collaborated to explore and analyze current and evolving security procedures and technologies to improve school security—primarily against active assailants
December 15, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) released a report from a School Security Simulation Experiment (SIMEX) focused on current security procedures and technologies to improve both physical and operational security in K-12 schools. The two-week SIMEX, conducted jointly with MITRE and George Mason University in August, served as a pilot to determine whether a SIMEX is a viable tool that can be used to evaluate policies, technologies, and procedures related to school safety in the future.
The FBI released detailed data on nearly 7.7 million criminal offenses reported via the National Incident-Based Reporting System (NIBRS) in 2019. The Uniform Crime Reporting (UCR) Program’s latest report, NIBRS, 2019, presents data about victims, known offenders, and relationships for offenses reported in 23 categories with 52 offenses. It also presents arrest data for those crimes, as well as 10 additional categories for which only arrest data is collected.
The town of Oxford, Connecticut and its public schools will receive a grant from the U.S. Department of Justice, Community Oriented Policing Services to create a security operations center (SOC) with three personnel monitoring the district's four school campuses.
Since June, protests have been happening across the United States. As civil disobedience increases, law enforcement agencies will prepare for the possibility of protests across the country. The potential continuation of political unrest means private security professionals must also be prepared with a plan that is tactically sound and protective of people and property. Here are a few ways you can prepare to protect clients’ businesses.
While providing access for third-party, non-employees is critical to meeting business objectives, it oftentimes has the unintended consequence of exponentially increasing an organization’s attack surface. With the proper identity-proofing practices and capabilities in place, organizations can verify the identities of their users, support risk management initiatives and better protect critical assets – eliminating the third-party risk management blind spots.