Is political polarization affecting your security program?

Is political polarization affecting your security program?

With the U.S. presidential election looming, the political divisiveness facing the nation is at an all-time high. Unfortunately, it’s difficult to prevent political discussions from spilling over into the workplace, and physical security teams are no exception. “When your employees have differing political views, these conversations can quickly escalate into debates or even arguments,” says Eric Sean Clay, healthcare security executive for a large healthcare system in Houston, TX, and President of the International Association…

Read More

The evolution of the corporate security mission

The evolution of the corporate security mission

When we started in corporate security, the emphasis in mission statements was on the protection of tangible assets, specifically people and property. As such, physical security strategies tended to focus on perimeter security measures and infrastructure, a guarding operation, CCTV coverage, access control systems, intruder alarms and the accompanying SOPs and standards that govern how all of these measures and programs are implemented and maintained. Often accompanying the mission is an “in order to” statement…

Read More

Proactive security: Identify the precursors of violence

Proactive security: Identify the precursors of violence

Workplace violence hurts a lot of people. According to the U.S. Department of Labor, about 2 million Americans are victims of non-fatal violence in the workplace; it is also the cause of around 1,000 homicides per year in the U.S. It is a major problem that has serious, lasting consequences for employees, their families and the organizations they work for. This issue, that impacts so many workers in industries like security as well as healthcare,…

Read More

False positives: Mitigating concerns from cybersecurity-minded users

False positives: Mitigating concerns from cybersecurity-minded users

Author’s note: Views are my own. Enterprise organizations may require that their product adhere to strict security requirements or undergo extensive vendor due diligence at onboarding. Technical analysis of the product, code or software via scanning or testing is often a step in this process. While a security assessment is a crucial component of any vendor management program, security assessments of a product can sometimes indicate risk when there is no risk. A typical example…

Read More

AI security risks: Separating hype from reality

AI security risks: Separating hype from reality

The security community — along with its collaborators in fields such as risk, audit and governance — is actively grappling with the implications of generative artificial intelligence (AI). A recent ISACA survey on AI found that the majority of organizations do not provide training on the authorized use of generative AI, and three out of 10 organizations have established policies governing the use of AI technology. It is undeniable that AI poses substantive risks to…

Read More

Key elements of a comprehensive K-12 security plan

Key elements of a comprehensive K-12 security plan

Key elements of a comprehensive K-12 security plan | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Product Spotlight on Analytics

Product Spotlight on Analytics

Product Spotlight on Analytics | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

November is Critical Infrastructure Security and Resilience month

November is Critical Infrastructure Security and Resilience month

November is Critical Infrastructure Security and Resilience month | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Rogue AI risks and how to mitigate them

Rogue AI risks and how to mitigate them

Rogue AI risks and how to mitigate them | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The transformative impact of cryptocurrency on digital fraud investigations

The transformative impact of cryptocurrency on digital fraud investigations

The transformative impact of cryptocurrency on digital fraud investigations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3 9