Evaluating Building Layouts to Mitigate Active Assailant Threats
By Timothy Brewer With 2017 and 2018 both setting unfortunate new records for the number of active shooter situations,…
By Timothy Brewer With 2017 and 2018 both setting unfortunate new records for the number of active shooter situations,…
By Travis Rothbloom The computer. The internet. The smartphone. What’s next? Many believe that Virtual Reality (VR) and Augmented…
By Steve Reinharz The artificial intelligence (AI) revolution brings new technologies into daily life. We’ve seen AI usage in diagnostic…
By Christopher Frenz With the pandemic ransomware attacks of both WannaCry and NotPetya devastating companies around the globe, ransomware was…
By Tim Crockett In today’s world, the health and well-being of your employees across the globe is an increasingly…
By Ron Martin, CPP It is important to note that security is a business function, not a subset or…
By Brent Barker Criminals are early adopters of new technology. They use it to create new crimes and improve…
By Tim Sutton, CPP In more states than not and in an increasing number of countries around the world, medical…
By Hector Sanchez, MBA; CPP Here we are just over 151 days into 2018 and we already have “473” injured…
To be presented by: Lynn de Vries, CPP, PCI & Erik de Vries, CPP Managing a crisis is always a…
What makes the dark web? By Cynthia Hetherington, The Hetherington Group The Dark Web, or darknet, is classified as…
by Garret Macrine 3 myths of campus security for educational institutions and houses of worship 1. “A security guard or…