Adrian Courtenay Top Priority Sector: security_services Image Caption: John Clark, Sr. The Whitestone Group of Columbus, OH has been awarded a $104 million contract from the Federal Aviation Administration (FAA) to provide security services at Control Towers and Airport Centers at 34 sites in the agency’s Eastern Security Area, which…
Feds warned about possible facility infiltration days before JFK airport breach
Mark Rockwell Top Priority Sector: perimeter_protection Image Caption: JFK Airport Days before a wayward jet skier scaled the perimeter fence at Kennedy Airport and walked unnoticed across runways and into a passenger terminal at facility, federal authorities had sent out a general reminder to law enforcement to be watchful of…
Computer Virus Sabotages Iran Nuke Facility
Last year, a cyber attack targeted Tehran’s nuclear program. Atika Shubert explains how a highly-specialized computer worm took down some of Iran’s centrifuges. View full post on computer worm – Yahoo! News Search Results View full post on National Cyber Security » Virus/Malware/Worms
Facility Security Officer (FSO)/Physical Security Manager
Business GE Corporate Business Segment Corporate Human Resources About Us X Role Summary/Purpose The FSO will administer and execute a strong security program in compliance with the National Industrial Security Program (NISP) and Department of Defense (DOD) and be the executive liaison with the Defense Security Service (DSS) and other…
Officials to open W.Va. Cyber Crime facility
MORGANTOWN, W.Va. – State and federal officials are gathering in Morgantown to open the new offices of the West Virginia Cyber Crime Cooperative. A ribbon-cutting is set for Wednesday morning. The Cooperative, formed in 2002, is a partnership of West Vi… View full post on cyber crime hacking – Yahoo!…
Officials to open at W.Va. Cyber Crime facility
State and federal officials are gathering in Morgantown to open the new offices of the West Virginia Cyber Crime Cooperative. View full post on cyber crime hacking – Yahoo! News Search Results View full post on National Cyber Security » Computer Hacking