2). The second essential component is that of assessing and identifying all true Critical Assets. This is the identification and prioritizing of those company assets…
Indeed, every project commences with a Threat Assessment together with a site visit to assess the local geographic environment, as well as studying the existing…
The start of a New Year full of Hope and Promise for all, but for Security in America, there are ominous trends that should not…
There are many excellent security contractors and integrators, but there are also more than a few that quite frankly should not be allowed near security…
However, simply taking large amounts of data, such as that generated by video surveillance cameras and other devices in different industrial and commercial environments, does…
Wivenhoe Management Group acknowledges the above and has developed a network of security consultants that can provide any given expertise. All Wivenhoe consultants have a…
From considerable experience in the field, you may want to consider the following perspective when the question of using security consultants next appears: SVA (Security…
It would be interesting to know which story is correct, as if it is true, it is simply a matter of time before terrorists or…
A Security Vulnerability Assessment (SVA) is typically the first stage requirement of the majority of new and existing Security Legislation now enacted in the U.S.…
Terrorism is a complex subject these days but certain principles do not change, and one of the primary terrorist aims is to intimidate peoples and…