• image
  • image
  • image
  • image
  • image
  • image

Hospital mixes security, freedom with electronic systems

by Leah Hoenen | February 14, 2014 | securitydirectornews.com/

HAMILTON, Ontario—Personal access control and a new layout have made a positive change in the feel of a hospital stay at the St. Joseph’s Healthcare Hamilton West 5th Campus, a facility here offering mental-health treatment, outpatient and diagnostic imaging services, hospital officials say.

Read more: Hospital mixes security, freedom with electronic systems

Global Cyber-Attackers Diversifying Their Techniques: CrowdStrike

by Robert Lemos | January 23, 2014 | eweek.com

A variety of groups linked to nation-states have advanced their cyber-capabilities over the past year and will likely expand their attacks in 2014, the company reported.

Read more: Global Cyber-Attackers Diversifying Their Techniques: CrowdStrike

Windows malware tries to infect Android devices connected to PCs

by Lucian Constantin | January 23, 2014 | computerworld.com

Researchers from Symantec found a Windows Trojan program that uses ADBto install online banking malware on Android devices

Read more: Windows malware tries to infect Android devices connected to PCs

NYC cops to keep close eye on Super Bowl fans

by Associated Press | January 24, 2014 | online.wsj.com

NEW YORK — When Super Bowl fans fill the streets of New York City next week, police will be watching them closely — in person, in the air and on closed-circuit monitors.

Read more: NYC cops to keep close eye on Super Bowl fans

BP locking down personal devices in the face of cyberwarfare

by Derek du Preez | November 13, 2013 | csoonline.com

Oil giant BP is currently having a "big internal debate" about how it can lock down personal computers without losing out on flexibility for employees, as a direct result of the increasing threat of cyber attacks.

Read more: BP locking down personal devices in the face of cyberwarfare

Managing cloud security takes a holistic approach

by RAY CAVANAGH | October 14, 2013 | securityinfowatch.com

The face of security has changed forever and now involves converged risk mitigation strategies for both physical and logical threats.

Read more: Managing cloud security takes a holistic approach

It’s risky business for companies that don’t arm themselves against cyber threats

by Editorial Board | October 13, 2013 | washingtonpost.com

FOR THE past couple of years, Gen. Keith Alexander, the head of both the National Security Agency (NSA) and the U.S. Cyber Command, has been outspoken in warning that private-sector computer networks, upon which the U.S. economy depends, are vulnerable to intrusion.

Read more: It’s risky business for companies that don’t arm themselves against cyber threats

Concerned employees can help prevent workplace violence

by Andrea Howry | October 2, 2013 | vcstar.com

Speaking up and ensuring that employees who are struggling get the help they need is critical to stopping the scourge of workplace violence.

Read more: Concerned employees can help prevent workplace violence