Remove Authorization Remove Education Remove Vulnerability
article thumbnail

Hurricanes Have Become more Deadly for Socially Vulnerable People

Recovery Diva

From Homeland Security News Wire: Hurricanes Have Become Deadlier, Especially for Socially Vulnerable. β€œIn In our study, excess death counts after tropical cyclones were higher more recently and for the most socially vulnerable,” said Robbie M.

article thumbnail

Book Review: Why Vulnerability Still Matters – The Politics of Disaster Risk Creation.

Recovery Diva

Why Vulnerability Still Matters -The Politics of Disaster Risk Creation , Edited by Greg Bankoff and Dorothea Hilhorst. Why Vulnerability Still Matters -The Politics of Disaster Risk Creation provides the reader with a comprehensive overview of vulnerability, disaster risk, and political systems. Routledge, 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this β€œthe most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

article thumbnail

Five Cybersecurity Sessions to Attend at ISC East 2024

Security Industry Association

In this session, attendees will hear how the Greater Toronto Airports Authority (GTAA) built a cybersecurity program for their operational technology (OT) infrastructure from the ground up. Learn to understand these threats, identify key vulnerabilities, and develop robust defense strategies. ISC East 2024 is coming up Nov.

article thumbnail

New Book Review

Recovery Diva

This textbook provides a multitude of case studies each written by academics who are actively teaching and/or have developed curriculum in the fields of crisis, disaster, and/or emergency management with a specific focus on vulnerable populations that are the weakest links in the hazard-risk chain. The case studies cover both the U.S.

article thumbnail

Six Cybersecurity Sessions to Attend at ISC East 2024

Security Industry Association

In this session, attendees will hear how the Greater Toronto Airports Authority (GTAA) built a cybersecurity program for their operational technology (OT) infrastructure from the ground up. Learn to understand these threats, identify key vulnerabilities, and develop robust defense strategies. ISC East 2024 is coming up Nov.

article thumbnail

Book Review: The Invention of Disaster

Recovery Diva

Book Review: The Invention of Disaster: Power of Knowledge in Discourses of Hazard and Vulnerability. Author : JC Gaillard, Professor of Geography, University of Auckland, New Zealand. The author also challenges the β€œinclusion” agenda of the Sendai and UN Climate Change frameworks. Series Editor: Ilan Kelman.