Following a Life Altering Event (LAE) that causes a breakdown of society and a loss of norms (law enforcement response, crime, security , etc); defend and protect life and assets …
RVing should be the adventure of a lifetime. It’s not all the time you get to call the open road your home while hitting those must-see spots and crossing them off your …
ONE-DAY SECURITY (REFRESHER) TRAINING Our 1-day security training is the perfect refresher, but also a great option for those who will be traveling to lower-risk areas. The training covers core …
EHS Insight for Manufacturing: Smarter Safety Management
Manufacturing facilities are dynamic, fast-paced environments where safety, quality, and compliance need to be managed with precision. From keeping employees safe on the production floor to maintaining compliance with OSHA, …
Audio summary on reasonably practicable – SafetyAtWorkBlog
In the next short audio episode, I discuss the myth of “reasonably practicable” within occupational health and safety (OHS) and the moral implications it carries. Safety is …
Estimated reading time: 7 minutes Every time you go to the grocery store, you’re offered free supplies for your survival stockpile. I’m talking about plastic grocery bags–the ones that are …
The single largest domino effect of disasters and emergencies is a power outage. Weathering a power outage can be easy if it only lasts for an hour or two, but …
Date: 18 September 2025, Thursday Time: 11:00 AM (CET) (Online Zoom) Are you struggling to identify new potential donors for your nonprofit? Does the donor landscape feel overwhelming, making it …
Google announces Sec-Gemini v1, a new experimental cybersecurity model
Today, we’re announcing Sec-Gemini v1, a new experimental AI model focused on advancing cybersecurity AI frontiers. As outlined a year ago, defenders face the daunting task of securing against all …
Alert: Exploit available to threat actors for SAP S/4HANA critical vulnerability
“This vulnerability could fill in an important gap in an attacker’s arsenal to attack these systems,” he added. “They will still need some credentials, but they could be low-level credentials …