Tag: information security
Physical Security Threats and Vulnerabilities
Learn what physical security threats and vulnerabilities your devices might be exposed to, and then learn how to harden those technologies against them.
6 Upcoming Loss Prevention Conferences and Events
2019 is in high gear, and we're just getting started. Let LPM help you find your next networking opportunity, retail technology expo, or training course.
Breaking News in the Industry: January 10, 2019
New card fraud scam targets EMV chips
A new warning is coming from the Better Business Bureau about a different method crooks are using to...
5 Upcoming Loss Prevention Conferences and Events
Happy New Year! This is the time of year when everyone's getting organized for 2019. Let LPM help you find your next networking opportunity, retail technology expo, or training course.
LPM Insider’s Top 5 Data Protection Articles of 2018
Posts about Facebook security, cyber risk trends, and scam artists past and present all made it into the top five for the data protection category.
Increased Corporate Data Security Spending Underscores Need for Personal Data Protection
Data security is a task that only the government and business leaders need to worry about, right? Wrong!
Security Executive Council Welcomes New Experts
The Security Executive Council (SEC) has added five new members to its team of experts: Amy Ballard, Alan Borntrager, Neil R. Johnston, Jerry D. Vergeront, and Dwight Williams.
The ‘Why’ behind Intellectual Property Theft Cases
It’s important to consider how a sense of entitlement can motivate wrongdoing, according to experts. For many of today’s workers, experts say, it’s not stealing at all—it’s leaving with what’s theirs.
R-CISC Membership Recognizes Its Own with Peer Choice Awards
The Retail Cyber Intelligence Sharing Center (R-CISC) announced the winners of its annual Peer Choice Awards in conjunction with its annual Retail Cyber Intelligence Summit.
How to Establish an Effective Information Security Policy
There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This will only happen if the policy reflects core business objectives.