Estimated reading time: 5 minutes If you’re away from home when the SHTF and don’t have your supplies or maybe not even a get home bag, a compact, lightweight go …
September 2025
A blackout box should focus on power sources and lighting to keep you safe and functional during power outages. Here’s a detailed list of items to include: 1. Portable Power …
About the Webinar This is a Webinar addressed to ActivityInfo users or colleagues interested to learn more about this functionality. Custom views, including Table, Map, Reader, and now Record detail …
In oil and gas, safety isn’t just important, it’s mission-critical. From offshore rigs to refineries and field operations, teams face high-risk environments where compliance, environmental stewardship, and worker protection must …
Every survival/preparedness kit needs an effective way to purify drinking water
Hydration is not optional. You drink enough water or you die. A quality water filter has a very important place in your preparedness supplies. By Leon Pantenburg Disclaimer: ITEHIL supplied …
There are several ways to write about Safe Work Australia’s recent Research Summit. This is the first article and will discuss a couple of features of the …
Dehydrated butter powder is a great way to balance a long shelf life with an easy way to elevate any meal or dish. Butter has plenty of uses, and adding …
About the Webinar Managing cases across teams and ensuring secure, high-quality data doesn’t have to be complicated. This Demo Webinar is ideal for program managers, case workers, M&E specialists, and …
How Pixel and Android are bringing a new level of trust to your images with C2PA Content Credentials
Posted by Eric Lynch, Senior Product Manager, Android Security, and Sherif Hanna, Group Product Manager, Google C2PA Core At Made by Google 2025, we announced that the new Google Pixel …
VoidProxy phishing-as-a-service operation steals Microsoft, Google login credentials
“By offering this sophisticated PhaaS, VoidProxy lowers the technical barrier for a wide range of threat actors to execute AitM phishing attacks. Accounts compromised using PhaaS platforms facilitate numerous malicious …