Hakimo, a technology company dedicated to modernizing physical security through its artificial intelligence (AI) software, recently announced that Punta Gorda Airport (PGD) has deployed the Hakimo solution to enhance security and support Transportation Security Administration (TSA) compliance efforts
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    (ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – recently announced the (ISC)² One Million Certified in Cybersecurity℠ program, pledging to put one million people through its foundational Certified in Cybersecurity entry-level certification exam and education program for free. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A lot of buzz in the security industry revolves around the explosion of the global datasphere. Especially as the COVID-19 pandemic has forced many industries to transition from in-house operations to work-from-home—if not entirely digital—formats, global data creation, consumption and circulation has skyrocketed.
                    
			            - By Eugene   Kozlovitser
- Aug 01, 2022
 
            
    
                
	                
                    
                                        
		            
                    Digital transformation is changing the way we do business and COVID-19 accelerated this shift. Organizations that had not already moved data to the cloud, rushed to do it, while others accelerated their shift from on-premise to cloud. 
                    
			            - By Rani  Osnat
- Aug 01, 2022
 
            
                
	                 
                    
                                        
		            
                    Security operations centers are undergoing dramatic changes as operators add hundreds of sources, systems and devices, creating a cacophony of alarms – enough to overwhelm the best-trained staff. 
                    
			            - By Simon  Morgan
- Aug 01, 2022
 
            
                
	                 
                    
                                        
		            
                    Mitigating risks and threats along with extensive intelligence analysis are at the core of comprehensive and effective customized executive protection programs.
                    
			            - By Brian  Jantzen
- Aug 01, 2022
 
            
                
	                
                    
                                        
		            
                    Potential security threats keep evolving. It’s a distressing reality that we continually need to adapt to—one that particularly weighs heavily on the minds of stakeholders at major sports venues as they explore security solutions to prevent drone, vehicular and other dangerous assaults.
                    
			            - By S. Guerry  Bruner
- Aug 01, 2022
 
            
                
	                
                    
                                        
		            
                    Security experts agree that the three most important components of a physical security plan are access control, surveillance and security testing, which work together to make a space more secure.
                    
			            - By Ralph  C. Jensen
- Aug 01, 2022
 
            
                
	                
                    
                                        
		            
                    How do you secure the largest cathedral in the world when it sits on 11.3 acres, is considered a New York City landmark, and is a busy destination for worship, cultural arts, social services and tourism?
                    
			            - By Bret  McGowan
- Aug 01, 2022
 
            
                
	                
                    
                                        
		            
                    The proliferation of smart edge devices that aggregate data and interoperate with other devices and systems on the network, is also fueling this migration by delivering additional sources of data that can help to streamline workflows, build efficiencies and save costs along with numerous other benefits.
                    
			            - By Steve  Guardiani
- Aug 01, 2022
 
            
                
	                 
                    
                                        
		            
                    IBM Security recently released the annual Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Business owners are making the move to higher resolution cameras at a pace that defies the influences of the pandemic, supply chain challenges, and labor shortage, according to a new 2022 worldwide security camera report.
                    
			            - By Dean  Drako
- Aug 01, 2022
 
            
                
	                 
                    
                                        
		            
                    The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    The business of cybercrime is rapidly increasing in scope and scale. The cost incurred by companies due to data breaches increased by nearly 10 percent from 2020 to 2021, meaning if the cost incurred by attacks was measured against the GDPs of all the nations of the world, it would be third largest, just lagging behind the U.S. and China. 
                    
			            - By  David  Ratner
- Jul 30, 2022
 
            
                
	                 
                    
                                        
		            
                    Critical infrastructure facilities can be quite large, so protecting them is a complex challenge that demands multifaceted solutions. Robust, cybersecure technology solutions exist to protect facilities of all sizes and types but getting the most out of these solutions requires attention to the human element as well. 
                    
			            - By Greg  Kemper
- Jul 29, 2022
 
            
                
	                 
                    
                                        
		            
                    Subscription-based service models are increasing in the security industry. Shifting to video subscription as a service (VSaaS) or SaaS in general involves changing the mindset that one is receiving a service rather than a product. What end users want is a system that is always current rather than a product that can quickly become out of date or is not functional when it matters most.
                    
			            - By Jesse  Crawford
- Jul 29, 2022
 
            
                
	                 
                    
                                        
		            
                    Across the globe, security teams are under pressure to justify what they do and how they do it. They need to continually make a strong case to internal and external shareholders for their budgets and activities. 
                    
			            - By Kelly  Lake
- Jul 29, 2022
 
            
                
	                 
                    
                                        
		            
                    For a casino, constant threats of theft, hacking, and fraud from guests and employees are simply table stakes. The combination of high-volume visitor traffic and significant amounts of cash can create potential security nightmares, with the cards often stacked against the house.
                    
			            - By Jordan   Rivchun
- Jul 29, 2022