News

The first step in enhancing physical data security is performing a vulnerability assessment. This involves identifying ...
In today’s threat landscape, identity governance doesn’t stop at the firewall. It extends to every card reader, turnstile, ...
The changing security landscape and closer integration with network platforms have created myriad new challenges for users and their security systems.
Maintain regulatory compliance by conducting regular audits, adhering to standards like ISO 27001, SOC 2, and GDPR, and ...
Conducting a security assessment, particularly with the assistance of a professional, can give K–12 IT teams an improvement ...
As physical security systems in K–12 schools grow more sophisticated, the lines between IT and facilities management departments continue to blur. Increasingly, IT professionals — traditionally tasked ...
Monitoring K-12 schools and institutions of higher education and ensuring the safety of students, faculty and staff has grown increasingly complex. Many large campus security and public safety teams ...
Steve Orrin is the federal CTO for Intel Corporation. He has held architectural and leadership positions at Intel, driving strategy and projects on identity, anti-malware, HTML5 security, cloud and ...
Colleges and universities have done little over the last three years to improve information security. Hindered by lack of staff resources and funding, security efforts remain largely unchanged, while ...
From spotting weapons and detecting smoke to predicting where incidents are most likely to occur, artificial intelligence is ...