Request a Demo

Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.

The Noggin Platform

The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.

Learn More
Resilience Management Buyers Guide - Thumbnail
A Resilience Management Software Buyer's Guide
Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More
  • Home
  • security management

security management

Latest Articles

The 5 Levels of Incident Response

It’s no secret that emergencies are getting more prolific. Some emergency managers even note that they are running their EOCs year-round because...

Read Article

Why Safety Incidents Are Still Going Unreported

The underreporting of safety incidents has long been a scourge. But many believed the issue had been improving over time, with the experience of...

Read Article

3 Pillars of Crisis Management

Crises are increasing in kind. But it’s not certain that organizations have appreciated the full implications. At least, many have yet to put in...

Read Article

How to Respond to a Cybersecurity Threat in 2025

October marks Cybersecurity Awareness Month. How should your organization respond to a cybersecurity incident in the new year?

We looked at the best...

Read Article

Analyzing the Resilience Maturity Model

Although National Preparedness Month (NPM) is over, the campaign to educate organizations on how to prepare for emergencies and disasters continues....

Read Article

Why Mental Health Can’t Be Ignored During Work Injury Recovery

Mental health can’t be ignored during work injury recovery. This might sound like common sense to Safety Managers, but now there’s a body of data to...

Read Article

Managing Threats and Business Risk

Very much in fashion, business resilience describes an organization's ability to respond to sudden disruptions that could threaten its operations,...

Read Article

Understanding Inherent vs. Residual Risk Assessments

In risk management, risk assessments are tools used to assess operational risks so an organization can effectively mitigate and manage those risks at...

Read Article

Defining Investigation Management

By now, many in the business world have heard of investigation management. However, they’re just as likely to be unable to define the term.

And...

Read Article

8 Essential Elements of Work Safety Management Software

By now, you’ve probably heard the many reasons to digitize work safety management. For one, running a paper-based safety program, even for the most...

Read Article

How Banks Can Strengthen Adoption of Basel Principles for Operational Resilience

With 45 members including central banks from nearly 30 jurisdictions, the Basel Committee on Banking Supervision is undoubtedly a global standard...

Read Article

How to Respond to a Cybersecurity Threat in 2025

October marks Cybersecurity Awareness Month. How should your organization respond to a cybersecurity incident in the new year?

We looked at the best...

Read Article

5 Strategies to Reduce Cyber Security Risks

Cyber security consists of all the technologies and practices that keep computer systems and electronic data safe. Cyber security is critical,...

Read Article

U.K. Makes News, Adding Data Centers to List of National Critical Infrastructure

The U.K. recently made news in the push to protect its national critical infrastructure. Noting pervasive cyber vulnerabilities, the country granted...

Read Article

4 Sources of Threat Intelligence

With cyber threats becoming more prolific and pernicious, detailed, actionable threat information has become more valuable. That type of threat...

Read Article

3 Types of Cyber Issues and How to Prepare for Them

When surveyed, business leaders will acknowledge the severity of the cyber threat. But about which specific cyber issues are they likely to be the...

Read Article

Critical Infrastructure Protection Deadlines Approach

Prolific attacks on our most essential assets demonstrate how vulnerable critical infrastructure is. And so, policymakers have intervened to protect...

Read Article

Major Deadlines for SoCI Act Compliance Loom

For some time now, attacks on critical infrastructure have been prolific. Australia stands out, though, as one of the few G20 countries to advance...

Read Article

What to Know about the National Security Memorandum on Critical Infrastructure

Last month ended with a major change in global infrastructure regulation. Indeed, with the National Security Memorandum on Critical Infrastructure,...

Read Article

Mandatory Cyberattack Reporting: A Harbinger of the Future?

As cyberattacks increase will regulators demand mandatory cyberattack reporting?

In one sector, they likely will.

Which one? Read on to find out.

Read Article

Strategies to Protect Critical Infrastructure in Times of Heightened Threat

Attacks on critical infrastructure assets are on the rise. And now, national publics are concerned. A staggering 81% of U.S. residents are worried...

Read Article

The Importance of Resilience Software for Critical Infrastructure

To say key assets are under attack is under statement. Key assets are under constant attack.

Onlookers might have been heartened that 2023 didn’t see...

Read Article

How the UK is scaling up preparedness for Terrorist Attacks

Over the last decades, the rise of DIY terrorist techniques has exposed the vulnerability of events, attendees, and the venues and public spaces...

Read Article
1 2 3 4 5
Request a Demo of Noggin