Remove 2017 Remove Activation Remove Application Remove Security
article thumbnail

Security Industry Association Announces 2024 Winners of the SIA Women in Biometrics Awards

Security Industry Association

Leire Arbona Puértolas, Melissa Conley, Heather Haller and Caitlin Kneapler will be honored for their leadership and contributions in biometrics and security at the 2024 SIA GovSummit. Department of Homeland Security (DHS) and TSA strategies and priorities. SILVER SPRING, Md. –

article thumbnail

Securing Mass Gathering Events: A Simple Design Framework That Considers the Air Domain

Security Industry Association

Planning and executing a mass gathering event is challenging, requires extensive coordination and can be time-consuming – it is also one of the most important security and safety actions you can take when it comes to protecting the public in dense crowd environments. Rest assured it will.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Science Really Says About Facial Recognition Accuracy and Bias Concerns

Security Industry Association

A second problem is that the algorithms evaluated were those publicly available in 2017 (now quite old given the pace of innovation in computer vision). government applications, including the FBI Criminal Justice Information Services Division and U.S. Algorithms used in border applications are a good example.

article thumbnail

SIA Tech Brief: Upgrade Path to AI –Video Over IP, Sensor Fusion and Aggregation of AI Processors

Security Industry Association

In addition to the more obvious alarm and object recognition tasks, the security industry can apply this through a focus on what’s missing and augment the security response, mitigation and design process so we’re working alongside tech instead of fearing replacement.

article thumbnail

Leading Remote Teams Effectively: 8 Do’s and 2 Don’ts

NexusTek

You might set aside time during meetings for social chat, or even schedule purely social virtual activities to help team members connect. They need access to the same data repositories as on-site staff to be equally productive, which requires that companies institute zero trust security measures. Remote Leadership Don’ts. CONTACT US.

article thumbnail

What Science Really Says About Facial Recognition Accuracy and Bias Concerns

Security Industry Association

A second problem is that the algorithms evaluated were those publicly available in 2017 (now quite old given the pace of innovation in computer vision). government applications, including the FBI Criminal Justice Information Services Division and U.S. Algorithms used in border applications are a good example.

article thumbnail

Are BYOD Practices Putting Your Business at Risk?

NexusTek

As BYOD creates distinct cyber security risks, it is important to understand the nature of those risks and how to contain them. Given these clear benefits, it’s easy to see why BYOD has caught on so widely; however, with these benefits come distinct cyber security risks. How Does BYOD Create Cyber Security Risks?

Malware 52