In the last decade, mobile computers have become as common in police cars as radios. So where do we go from here?
Advancements in the computing landscape are driving the adoption of more and more cloud-hosted offerings in security.
Universities must do a better job of controlling the security risks associated with personal smartphones and tablets.
This guide was developed to encourage you to look at your current preparedness plan’s effectiveness and determine how you can strengthen it before an active shooter threat becomes a reality.
Crisis response can be a weak spot for many campuses. Learn how to manage tasks, share response plans and maintain command and control over response teams during a crisis.