Security policy

INSA Report Examines Use Of Publicly Available Electronic Information For Security Determinations And Insider Threat Monitoring

As the U.S. government reforms its security clearance process, it must address the use of publicly available electronic information (PAEI)—specifically social media and commercially available databases—for personnel security determinations and insider threat purposes, according to a new white paper issued by the Intelligence and National Security Alliance (INSA). The Use of Publicly Available Electronic Information for Insider Threat Monitoring, developed by the INSA Insider Threat...

The Oil And Gas Market: How Technology Is Powering Safety, Compliance, And Efficiency

The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling incr...

Can We Prevent Active Shooters Through AI Technology?

According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per...

New Year's Resolutions To Counter Web And Mobile Application Security Breaches In 2019

With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organization’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scop...

MedixSafe Introduces GS1 Gun Safe Cabinet To Safeguard Firearms For Airport Security Staff And Private Gun Owners

MedixSafe, a pioneer in the access control cabinet market, is pleased to introduce its new GS1 Gun Safe. Initially custom-built to accommodate a request from a police department looking to secure firearms, the GS1 electronically controlled cabinet is an access control solution that law enforcement, airport security staff and private gun owners alike can count on to restrict access to their firearms. Easy to manage from any computer, the MedixSafe GS1 is equipped with a stand-alone networkable T...

Beyond Cyber Security: Why Physical Security Must Be A Key Element Of Data Protection

Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorize him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth...