window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-141226144-1');

Blog

Securing public gatherings strategies

2023-03-08T15:37:25-05:00

Auhor - Madeline Lauver Securing public gatherings strategies: Public gatherings have become targets for security threats and acts of violence in recent years. In the United States, attacks on schools, religious institutions, and large events have spurred evaluations of organizational

Securing public gatherings strategies2023-03-08T15:37:25-05:00

Streamlining security operations centers

2023-02-21T23:42:43-05:00

Author -  Simon Morgan Streamlining security operations centers (SOC): The transition from a security operations center to a threat collaboration environment. There is an onslaught of security data – generating information in different formats, storing it in different places, and

Streamlining security operations centers2023-02-21T23:42:43-05:00

Retail security and video content analytics

2023-03-23T22:39:47-04:00

Author -  Lizzi Goldmeier Retail security and video content analytics: More people are venturing out and visiting stores amidst the easing of pandemic-era lockdowns, and not all are innocent consumers. Retailers can prepare for this influx by investing in video

Retail security and video content analytics2023-03-23T22:39:47-04:00

Mitigating employee risk in remote work environments

2023-01-17T22:41:42-05:00

Report -  Security Staff Mitigating employee risk in remote work environments: Eighty-one percent of surveyed information technology (IT) leaders reported that remote working is now standard practice within their organization, with half of all respondents revisiting and updating data security

Mitigating employee risk in remote work environments2023-01-17T22:41:42-05:00
Go to Top