The Total Security Summit is a dynamic two-day event specifically targeted at Security Professionals across all sectors. The summit is set up to facilitate focused discussions between you and vendors who will walk you through the latest technologies and innovative solutions to meet your business’s security needs.
Every IT department has some old gear that’s functional, but is built to handle old storage material or can’t handle modern work demands. It can often be a pain to recycle, and, it’s still functional, so why get rid of it? Who knows, maybe someone will need a file stored on a legacy medium. Well, […]
Joseph Priestly, an 18th-century theologian, once said “The more elaborate our means of communication, the less we communicate.” I wondered what he would make of today’s world where social media, texting, Voice over IP, two-way radios, mobile phones, Wi-Fi, mass notification and more stream across our airwaves. Nowadays, our ability to instantly communicate with one […]
Managing the storage requirements of integrated electronic systems is increasingly becoming a challenge. Larger files, changing retention policies, and new analytics and search tools offering greater forensics, are pushing storage to the max.
On April 3, 2018, an active shooter situation unfolded on the YouTube campus in San Bruno, California. The shooter, Nasim Aghdam attacked due to her anger over a change in policy that limited which content creators could monetize their videos through advertising revenue.
The company formerly known as TASER and now known as Axon has created the market standard for what are formally called conducted electrical weapons (CEWs) or electronic control devices (ECDs). Axon says that over two-thirds of law enforcement officers around the United States carry its device. While Axon sells TASERS to the public, the market […]
Cyberattackers often try to gain entry to critical IT systems through the various electronic entry points and backdoors left by the programmers who created them. Some hackers take the human approach, which can be much simpler, and attempt to get password and network access information by calling employees directly and impersonating their IT colleagues.
Many organizations rely on visits from clients and/or vendors as a part of normal business operations, while others strictly forbid outside access to their offices. Regardless of how your business operates, however, there should be a clear workplace visitor policy in place, and it needs to be communicated to all employees. These policies serve to […]
Security professionals in health care are relied upon to both mitigate and manage huge complexes and remote facilities. The need to balance and maintain a welcoming environment, while protecting the people and assets within these healthcare facilities is a monumental task.
A successful business is expanding locations on a regional level and needs surveillance at all its sites. A mini-city, large-scale, master-planned community pops up with its own security challenges. Their needs are met in unique ways.