What is the difference between IT and OT security and protection?
TABLE OF CONTENTS
FrontLine Safety & Security 2016: ISSUE 3
One of the leading gateways for hackers to attack your cyber systems is through your own physical security systems, especially your wired cameras or contactless card access control systems. It’s time to encrypt.
Is there a weak link in the system, be it in the selection criteria for new recruits, or a lack of sensitivity training, or a need to identify bias of officers within the ranks?
Cyber is a common thread that runs through the national security portfolio, defence and foreign policy, public safety’s security strategy, and critical infrastructure protection requirements of both the public and private sectors.
After years of talk but little action, the first challenge will be to find ways to maximize domain awareness of the Arctic.
When it comes to protecting what’s worth stealing, it’s your employees, not your computers, that are the weakest link. So what do you do about it?
Although public safety departments collect a huge amount of data, they can’t always interpret it in any useful way in real-time. That’s why data analytics is at the forefront of the revolution in security technology.
Advances in drone platforms and the multi-spectral, multi-sensor technology payloads make them invaluable for disasters, SAR, environmental surveillance and more.
For years, the Canadian Coast Guard has been managing a gap between requirements and budget. Reducing that gap has become a Liberal priority. FrontLine interviews Commissioner Jody Thomas about today’s challenges and solutions.
Working towards improvement of police-community relations is critical for successful future policing directions.
A recent conference examined numerous issues related to terrorism threat in Canada. What can communities do? What responsibilities do politicians have?