#emergency-signing

[ follow ]
Psychology
fromSilicon Canals
1 day ago

The people who always have a backup plan aren't pessimists. They grew up in environments where promises were unreliable, and redundancy became the only architecture that didn't collapse when someone changed their mind without warning. - Silicon Canals

Obsessive planners are often generous, driven by past experiences that teach them to prepare for uncertainties.
#wildfires
San Francisco
fromABC7 San Francisco
1 day ago

LIVE: Crews responding to cargo pallet fire at SFO, officials say

A fire broke out at a cargo building at San Francisco International Airport, but there are no injuries or impact on airport operations.
fromComputerworld
1 day ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
#cybersecurity
Information security
fromThe Hacker News
4 days ago

The AI Arms Race - Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is rapidly evolving, with AI enabling faster and more sophisticated attacks, necessitating advanced defensive strategies.
Information security
fromSecuritymagazine
2 weeks ago

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Cybersecurity practitioners face data overload, struggling to extract meaningful insights while focusing on relevant threats to reduce business risk.
Law
fromAbove the Law
3 weeks ago

Seven Essential Security Strategies For Law Firms And Legal Departments - Above the Law

Legal professionals must prioritize cybersecurity as a leadership imperative, with one in three law firms targeted by breaches costing over five million dollars annually, requiring proactive vendor management and transparent security practices.
Information security
fromThe Hacker News
4 days ago

The AI Arms Race - Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is rapidly evolving, with AI enabling faster and more sophisticated attacks, necessitating advanced defensive strategies.
Information security
fromSecuritymagazine
2 weeks ago

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Cybersecurity practitioners face data overload, struggling to extract meaningful insights while focusing on relevant threats to reduce business risk.
Higher education
fromwww.bbc.com
3 days ago

Newly qualified paramedics told to apply for jobs abroad due to hire freeze

Newly qualified paramedics in Wales are advised to seek jobs abroad due to a recruitment freeze.
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Public health
fromMail Online
4 days ago

Elderly people should be SEPARATED on flights to speed up evacuations

Elderly passengers should be distributed evenly on flights to enhance emergency evacuation efficiency.
DevOps
fromInfoQ
5 days ago

Failure As a Means to Build Resilient Software Systems: A Conversation with Lorin Hochstein

Using software failures can enhance software architecture and reliability engineering practices.
Remote teams
fromTheregister
6 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
Social media marketing
fromEntrepreneur
5 days ago

Not All PR Fires Burn the Same - Here's How to Put Them Out

Reputation management during a crisis requires digital intervention and a well-crafted media response to effectively control the narrative.
EU data protection
fromFast Company
1 week ago

The most important defense regulation you've never heard of

CMMC mandates new cybersecurity standards for the defense industrial base, impacting thousands of businesses and transforming the defense supply chain.
Podcast
fromSecuritymagazine
1 week ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
fromNextgov.com
4 days ago

Agency CIOs must supply top-down IT contract information, OMB memo states

What we want to do is make sure that CIOs are fully empowered to be there at the beginning of conversations, that they are part of the formulation of budget and policy from liftoff.
Privacy professionals
World politics
fromThe Cipher Brief
1 week ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
San Francisco
fromMission Local
5 days ago

Cell outage blocks San Francisco 911 calls

A cell outage may disrupt 911 calls in San Francisco, prompting residents to use Wi-Fi calling or text 911 for assistance.
Psychology
fromFortune
1 week ago

What avalanche safety training can teach corporate boards about bad decisions | Fortune

Unanimous decisions in corporate boards may indicate group dynamics issues rather than true agreement, similar to avalanche safety training.
Information security
fromSecurityWeek
2 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Agile
fromBusiness Matters
2 weeks ago

How to Avoid Construction Delays and Stay on Schedule

Construction delays can derail projects due to poor planning, resource shortages, and communication breakdowns, but can be mitigated with effective strategies and technology.
Berlin
fromwww.berlin.de
2 weeks ago

Berlin plans to strengthen civil defense

Berlin's Senate commits to strengthening civil defense through appointing coordinators in each department and increasing crisis drills to enhance population protection and crisis resilience.
Public health
fromMail Online
1 week ago

Emergency list reveals survival items Americans should stockpile

Americans should prepare emergency supplies to sustain themselves for several days without outside help during disasters.
#executive-protection
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
#fema
SF politics
fromenglish.elpais.com
2 weeks ago

The future of FEMA is at stake under the leadership of Markwayne Mullin

The removal of Kristi Noem from DHS raises concerns about FEMA's future leadership and disaster response effectiveness under Markwayne Mullin.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
fromWIRED
3 weeks ago

Why Your Phone Battery Dies Faster During a Public Emergency

When cell towers are damaged or overloaded, phones work harder to stay connected, using up more power. Weak signals, frequent reconnecting, and increased activity from the phone's modem are among the main reasons the battery does not last as long in these situations.
Coronavirus
fromThedrum
3 weeks ago

How to react if a client pauses your marketing services

If your client pauses your services, it could mean that they're facing financial difficulty and by offering further collaboration, could potentially help the business - in the end, we're all going through this together. In terms of maintaining your relationship your team could offer consultancy at no extra cost.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
fromTheregister
3 weeks ago

Bug that wiped customer data saved the day - and a contract

I looked at the config and noticed the customer did not have a default route set. He wasn't sure if that was the problem, so he made some changes he thought might be useful. The router Caleb worked on then rebooted, which he expected. But when it restarted, its previous configuration was gone.
Tech industry
#emergency-management
Online Community Development
fromNextgov.com
2 weeks ago

When disaster strikes, census data can help show who is in harm's way

The U.S. Census Bureau's OnTheMap for Emergency Management tool helps officials quickly estimate population and workforce data in disaster-affected areas to guide emergency response and recovery efforts.
Online Community Development
fromNextgov.com
2 weeks ago

When disaster strikes, census data can help show who is in harm's way

The U.S. Census Bureau's OnTheMap for Emergency Management tool helps officials quickly estimate population and workforce data in disaster-affected areas to guide emergency response and recovery efforts.
Mental health
fromSilicon Canals
3 weeks ago

People who stay calm during emergencies but fall apart over minor inconveniences aren't fragile. Their system was calibrated for catastrophe, and it genuinely doesn't know how to scale down to a traffic jam or a lost set of keys. - Silicon Canals

Accumulated small daily frustrations can trigger greater stress responses than single major crises in people whose nervous systems were calibrated for survival under chronic danger or high-stakes conditions.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromFast Company
4 weeks ago

Pentagon follows through with its threat, labels Anthropic a supply chain risk 'effective immediately'

The Pentagon said in a statement Thursday that it has 'officially informed Anthropic leadership the company and its products are deemed a supply chain risk, effective immediately.' The decision appeared to shut down the opportunity for further negotiation with Anthropic, nearly a week after President Donald Trump and Defense Secretary Pete Hegseth accused the company of endangering national security.
US politics
Privacy professionals
fromThe US Sun
2 weeks ago

Small businesses sleepwalking into cybersecurity crisis, expert warns

One in five UK SMEs would close within three months following a data breach, with businesses losing up to £100k annually on unbudgeted security fixes despite risky practices like public Wi-Fi use and minimal cybersecurity training.
Social justice
fromwww.mercurynews.com
1 month ago

Letters: Police are the wrong people for crisis intervention

Police lack the advanced clinical training and education of counselors and are inappropriate for crisis intervention; behavioral health-led responses by clinicians and social workers are more effective and cost-effective alternatives.
Travel
fromTravel + Leisure
1 month ago

Flight Attendants and Pilots Use These 4 Phrases on Board to Signal Emergencies-Here's What to Listen For

Aviation crews use coded language like 'Code 300' and 'Angel' to discreetly communicate medical emergencies and deaths without causing passenger panic.
fromBusiness Insider
1 month ago

I led communications at FEMA during a hurricane - and had to flee my home after a death threat

In the middle of the response, as we were communicating safety and recovery information, other public officials and I were targeted. A mix of people were insinuating that we weren't doing our job. They were also spreading misinformation. As I reflect, what was really surprising to me at the time was getting attacked for my religion. I'm Jewish. There were a lot of people online who could say anything and everything without knowing me - very hurtful things.
Women in technology
Privacy professionals
fromwww.housingwire.com
2 weeks ago

Reducing risk: Why logging, protection, and review matter

Application logs are critical cybersecurity safeguards that provide visibility into system behavior, enabling early detection of security threats and operational issues in real estate and mortgage lending organizations.
Mental health
fromPsychology Today
1 month ago

Hope in Hostage-Taking and Kidnapping Incidents

Narratives shape how people process trauma and build resilience, while uncertainty from wrongful detention creates profound psychological strain that unfolds silently within families.
Artificial intelligence
fromTechCrunch
4 weeks ago

Anthropic's Pentagon deal is a cautionary tale for startups chasing federal contracts | TechCrunch

The Pentagon designated Anthropic a supply-chain risk after disagreeing over military AI control, leading to a failed $200 million contract and DoD's pivot to OpenAI.
Psychology
fromPsychology Today
1 month ago

How to Help Communities Rebound from Crisis and Disaster

Disaster psychology provides an empirically-based framework for building community resilience and growth during crises through understanding predictable psychological phases and natural recovery mechanisms.
Information security
fromZDNET
1 week ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
Mental health
fromPsychology Today
1 month ago

Navigating the Messy Middle of Disaster Recovery

Disaster recovery extends beyond the initial crisis phase; year two brings psychological challenges including chronic stress, financial strain, and bureaucratic delays that impair functioning and compound trauma.
Law
fromBusiness Matters
1 month ago

How Unexpected Workplace Incidents Can Disrupt Business Continuity

Unexpected workplace incidents can quickly disrupt operations, creating legal liability, staffing strain, lost momentum, and eroded trust for small and mid-sized businesses.
Information security
fromThe Hacker News
2 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Privacy professionals
fromDataBreaches.Net
1 month ago

Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule - DataBreaches.Net

A partial government shutdown delays the DHS cybersecurity incident reporting rule, leaving companies uncertain about compliance requirements and enforcement timelines.
Gadgets
fromNextgov.com
1 month ago

When every second counts: government tech helps first responders' lifesaving missions

Indoor-capable drones and indoor location-tracking technologies significantly improve first responder situational awareness and reduce risk in hazardous interior environments.
Information security
fromSecuritymagazine
3 weeks ago

Discussing Use of Force in Security: A Challenging Discussion?

Use of force in security cannot be entirely avoided but should be deployed only as a last resort when lesser options fail, requiring comprehensive training in tactics, de-escalation, and legal authority.
US news
fromwww.npr.org
1 month ago

3 big changes are proposed for FEMA. This is what experts really think of them

A proposed overhaul would shift disaster responsibility to states, halve FEMA's workforce, and enact reforms requiring some congressional approval.
Information security
fromSecurityWeek
3 weeks ago

How to 10x Your Vulnerability Management Program in the Agentic Era

Agentic AI cyberattacks are actively occurring, forcing vulnerability management to evolve from static scanning to continuous, contextual, autonomous remediation systems.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
Mental health
fromSecuritymagazine
1 month ago

Implementing Meaningful De-Escalation Training in Your Security Program

De-escalation training reduces aggressive incidents and is a critical risk-mitigation strategy for modern security personnel and organizations.
Information security
fromSecuritymagazine
3 weeks ago

Why Security Culture Metrics Matter More Than Dashboards

Traditional cybersecurity metrics create false confidence by masking hidden risks; culture metrics measuring employee engagement and responsiveness are essential for actual security effectiveness.
fromLos Angeles Times
2 months ago

Leaked memo reveals California debated cutting wildfire soil testing before disaster chief's exit

One year ago, Nancy Ward, then the director of the California Governor's Office of Emergency Services (Cal OES), petitioned the Federal Emergency Management Agency to spearhead the cleanup of toxic ash and fire debris cloaking more than 12,000 homes across Los Angeles County. Although Ward's decision ensured the federal government would assume the bulk of disaster costs, it came with a major trade off.
California
Healthcare
fromwww.bbc.com
2 months ago

Critical incident declared at city hospital trust

Nottingham University Hospitals NHS Trust declared a critical incident due to unprecedented patient demand, causing severe delays and elective procedure rearrangements to protect patient safety.
fromBuzzFeed
1 month ago

First Responders Are Calling Out The "Fatal" Safety Mistakes You Should Never, Ever Make

If you are choking and are alone, try to get yourself into a high-traffic area, such as a hallway in a building or outside your house. If you pass out, you're way more likely to be found as opposed to being in a room in a building or your house. Call 911 even though you can't speak. Someone will be sent to your location by dispatch.
Public health
Public health
fromBuzzFeed
1 month ago

First Responders Are Calling Out The "Fatal" Safety Mistakes You Need To Stop Making ASAP

Home medical oxygen increases fire risk; secure and store cylinders properly, avoid ignition sources, and use smoke alarms and warning signs.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
Public health
fromBuzzFeed
2 months ago

19 "Fatal" Safety Mistakes You Should Never, Ever, EVER Make, According To First Responders

Prioritize immediate assistance over recording, call emergency services, learn airway-clearing and choking first aid, and secure pets so responders can access the scene safely.
fromDataBreaches.Net
1 month ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
fromBusiness Insider
2 months ago

How 911 calls actually work, according to a former emergency dispatcher

Across the country, emergency call centers are short-staffed, underfunded, and losing dispatchers faster than they can replace them. A 2023 survey found that one in four 911 positions nationwide is vacant, and 36% of centers reported having fewer positions filled in 2022 than in 2019. Martinez explains to Business Insider how dispatchers decide who gets help first for police, ambulance, and fire services, why they sometimes have to drop one call to save another, and the "caller hacks" that can literally save your life.
Mental health
#incident-response
fromSecuritymagazine
1 month ago

Strategies for Security Leaders in the Midst of Skill Shortages

Organizations have reported heightened cybersecurity risks as a result of these skill shortages, but the issues don't end there. Many teams will also experience burnout, which is an issue for security teams even in the best of times, which can only add to the talent gap concern if burnt out employees leave the industry.
Information security
fromSecuritymagazine
2 months ago

Compliance Theater: Why Cybersecurity's Favorite Shakespearean Tragedy is Failing Us

IT security teams, especially the compliance cast, love drama. The slower, more arcane, and less intelligible the script, the louder the applause. Every few years, someone strides onstage with a seemingly edgy rallying cry: "Let's burn it all down and start again!" Let's be honest: torching the set doesn't fix the play. The real villain isn't any one framework. It's the lackluster production we force our best people to perform "assessments" that consume weeks, cost a fortune, and deliver stale, unread artifacts.
Privacy professionals
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromBusiness Matters
1 month ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
Information security
fromSecuritymagazine
1 month ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
fromSecuritymagazine
1 month ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromAbove the Law
2 months ago

Think You Are Covered? Better Read Your Cybersecurity Policy - Carefully - Above the Law

Cyber insurance often fails to fully protect organizations due to exclusions, leaving law firms particularly vulnerable without proper cybersecurity and coverage review.
Information security
fromThe Hacker News
2 months ago

CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024

CISA retired ten emergency directives issued 2019–2024 after federal remediation and enforcement via BOD 22-01 to strengthen federal cybersecurity and reduce exploited vulnerabilities.
Information security
fromwww.housingwire.com
2 months ago

Reducing risk: The importance of administrative access responsibilities

Clearly defined and strictly managed administrative access reduces cybersecurity risk while preserving operational efficiency in real estate, title insurance, and mortgage systems.
Information security
fromSecuritymagazine
2 months ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
[ Load more ]