article thumbnail

Book Review: Disaster Management and Information Technology

Recovery Diva

Book Review: Disaster Management and Information Technology: Professional Response and Recovery Management in the Age of Disasters. Funding and Contributions: Includes insights into various sources and players promoting innovative IT solutions like the European-funded project FASTER, or the wisdom from authorities like Peter T.

article thumbnail

Public Information Strategies in the Pandemic

Disaster Zone Podcast

Public Information Officers (PIO) had their work cut out for them in responding to the COVID pandemic. Meredith is also active in the field of graphic medicine, as a cartoonist and author of Graphic Public Health: A Comics Anthology and Roadmap. King County Washington was the first place in the USA that a death from COVID occurred.

Pandemic 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. House Passes Bill to Requiring FCC to Limit New Authorizations for Chinese Equipment, Prohibit Revocation

Security Industry Association

would require the Federal Communications Commission (FCC) to adopt rules prohibiting “equipment authorization” for certain Chinese telecommunications and video surveillance equipment. 19, the FCC had published a proposed rule that would prohibit new authorizations for equipment considered part of the FCC’s “Covered List.”

article thumbnail

How Mass Gun Violence Trends Should Inform Physical Security Planning

Security Industry Association

These insights can be used to inform your physical security planning. Conclusions Something I stress as much as I can is hardening the most vulnerable points of entry in order to delay a shooter until the authorities arrive. UL levels four and up offer protection against a variety of rifles, including semi-automatic and hunting rifles.

article thumbnail

Information Security vs. Cybersecurity: Main Differences

Reciprocity

Cybersecurity and information security are often assumed to be synonymous terms. The objective is to protect an organization’s information and communication technologies (ICT) from cyberattacks. What is Information Security? ” Modern businesses house most or all of their information within electronic sources. .”

article thumbnail

How To Protect Your Enterprises’ Sensitive Information

Assurance IT

With data and information being the most valuable asset in the world, how are you protecting your enterprise’s digital footprint? In this blog, we review the types of information that need to be protected and how to protect your enterprise’s sensitive information. What is Considered Sensitive Information?

Banking 52
article thumbnail

Supply Chain Insights

Disaster Zone Podcast

Philip Palin is the author of Out of the Whirlwind: Supply and Demand after Hurricane Maria , published by Rowman & Littlefield (2019). Also author of Considering Catastrophe. Principal author of Catastrophe Preparation and Prevention series from McGraw-Hill. Also author of Considering Catastrophe.