Archives

U.S. Survey Explores ‘Mental Toll’ of Gun Violence, Attitudes Toward Security Measures

A new, comprehensive survey gauges Americans’ concerns about gun violence and what steps they’re willing to take to feel safer in public areas. Weapons detection company Evolv Technology commissioned market research firm Equation Research to survey over 2,000 U.S. adults from Oct. 20 to Oct. 28, 2021. Evolv says the resultant report, Guns in America: A Survey on […]

Security Pros Talk Top Trends at ISC East Tradeshow

Did you miss the recent ISC East tradeshow in New York City? If so, fear not—we’ve got you covered! Our team at Total Security Advisor walked the showroom floor, shook many sanitized hands, took notes, checked out the newest tech, and picked the brains of attendees about top industry trends. The main takeaway? The security […]

Feds Issue Cybersecurity Reminder Amid the Holiday Season

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a cybersecurity reminder for public- and private-sector organizations to remain vigilant and take appropriate precautions to reduce their risk to ransomware and other cyberattacks leading up to and during the holiday season. The agencies noted this advisory is based on observations on […]

DOJ’s New Enforcement Team May Intensify Push to Recover Cyberattack Payments

The U.S. Department of Justice (DOJ) recently announced the launch of a National Cryptocurrency Enforcement Team (NCET) to (1) add structure to and coordinate the agency’s investigative capabilities concerning unlawful uses of cryptocurrency, (2) increase prosecutions, and (3) recover illicit proceeds. The last piece is especially striking because it may provide a positive incentive for […]

SIA Highlights What the New Infrastructure Law Means for Security Pros

On Nov. 15, President Joe Biden signed into law the $1.2 trillion Infrastructure Investment and Jobs Act. The bipartisan legislation, which Congress recently passed following months of negotiations, includes investments designed to help fix, modernize, and secure the country’s infrastructure. “Look folks, for too long, we’ve talked about having the best economy in the world,” said […]

3 Key Considerations of Endpoint Security in a Hybrid IT Ecosystem

As we moved through 2021, the underlying assumption was that it would be better than 2020, which is admittedly a very low bar to clear. From an IT perspective, 2021 has proven to be even more challenging than the kidney stone of a year that preceded it. While there are lots of considerations that are […]

Houston Concert Tragedy Casts Crowd Management into the Spotlight

Update 11/15/21: The death toll has risen to 10 after a college student and 9-year-old boy critically injured at the event later died. Over the weekend, tragedy unfolded at NRG Park in Houston, Texas, when eight young concert goers, between the ages of 14 and 27, were killed when reported crowd surges occurred during the Astroworld […]

Does Working in the Cloud Make Your Business More Secure?

Over the course of the COVID-19 pandemic, there was a huge change in the way that businesses operate. Whether they were forced to by lockdowns or simply took precautionary steps to help prevent the spread of the virus, many businesses asked employees to work from home for at least a part of the pandemic.  Remote […]

Common Misconceptions of Business Recovery from Cyberattacks

As ransomware attacks exponentially explode across the threat landscape, organizations are having to confront woeful inadequacies in recovery plans and preparation. Many are incorporating strategies like zero-trust and adopting technologies that integrate privacy and security into the designs. Even with all the latest tools and techniques in place, it can be near impossible to make […]

How Buildings Can Optimize Visitor Management with Digitization

When the pandemic disrupted most facets of life as we knew it, it also accelerated a shift in visitor management (VM) to a more frictionless―and especially touchless―experience. For many companies and organizations, VM is a cumbersome manual process, with security personnel maintaining a physical entry log in which visitors would fill out a paper form […]