News

The first step in enhancing physical data security is performing a vulnerability assessment. This involves identifying ...
Maintain regulatory compliance by conducting regular audits, adhering to standards like ISO 27001, SOC 2, and GDPR, and ...
In today’s threat landscape, identity governance doesn’t stop at the firewall. It extends to every card reader, turnstile, ...
The changing security landscape and closer integration with network platforms have created myriad new challenges for users and their security systems.
Conducting a security assessment, particularly with the assistance of a professional, can give K–12 IT teams an improvement ...
As physical security systems in K–12 schools grow more sophisticated, the lines between IT and facilities management departments continue to blur. Increasingly, IT professionals — traditionally tasked ...
Monitoring K-12 schools and institutions of higher education and ensuring the safety of students, faculty and staff has grown increasingly complex. Many large campus security and public safety teams ...
In this episode of Today in Tech, host Keith Shaw and guest James Benum explore how AI-powered cameras, drones, and large ...
Steve Orrin is the federal CTO for Intel Corporation. He has held architectural and leadership positions at Intel, driving strategy and projects on identity, anti-malware, HTML5 security, cloud and ...
Colleges and universities have done little over the last three years to improve information security. Hindered by lack of staff resources and funding, security efforts remain largely unchanged, while ...
High-profile cases, such as the assassination of Brian Thompson, have fuelled existing concerns over executive safety.