Request a Demo

Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.

  • Home
  • security management

security management

Latest Articles

How Noggin Helps Streamline Crisis Management Planning

When an incident threatens an organization, its integrity, and viability, that organization will turn to a strategic plan to define how the incident...

Read Article

What Were the Top 10 U.S. Industries Affected by Strikes in 2024?

The U.S. might not have as a robust a striking culture as some of its peers in the Organization for Economic Co-operation and Development (OECD), but...

Read Article

Top 8 Critical Event and Security Threats to Watch in 2025

The new year is only a few weeks old, but even in such a short amount of time, a number of significant crises and disasters have already affected...

Read Article

Explaining the Critical Entities Resilience (CER) Directive

Resilience isn’t just a priority for enterprises, agencies, and other organizations. But it’s become a governmental priority, too, especially in the...

Read Article

What Is an Incident Management System (IMS)?

Crises, emergencies, and events are a fact of life – inevitable. But preparatory measures go a long way to ensuring overall organizational...

Read Article

What is Workplace Violence?

April marks Workplace Violence Prevention Awareness Month and with it, a campaign to increase awareness to recognize, prevent, and respond to...

Read Article

The Role of Business Continuity Planning in Long-Term Strategy

Developing an effective business continuity plan (BCP) requires understanding your organization’s critical processes, dependencies, and risks. If...

Read Article

Critical Infrastructure Regulation in the EU

It's no secret that critical infrastructure assets are increasingly under threat. Lawmakers are pulling policy levers to ensure organizations in...

Read Article

Steps to Creating a Best-Practice Incident Action Plan (IAP)

A strong incident management program depends on a well-crafted incident action plan (IAP). A documented set of directives activated the moment an...

Read Article

What’s a Workplace Chemical Protection Program (WCPP)?

Heavily regulated, chemical substances can present an unreasonable risk of injury to worker health or the environment.

That’s why regulators often...

Read Article

5 Must-Have Incident Reporting Features in Crisis Management Software

When a crisis hits, teams need to be able to gather accurate information in a centralized, accessible space. That’s why crisis management programs...

Read Article
Request a Demo of Noggin

The Importance of Physical Security Information Management (PSIM)

In physical security management, we’ve traditionally built security apps and devices to respond to specific threats. What happens, though, when...

Read Article

Physical Security Information Management (PSIM) Explained

When polled in 2022, most organizations reported seeing a steady or increasing level of physical security incidents. In this article, we discuss how...

Read Article

What Is Threat Intelligence?

Ransomware is in the news. However, backdoors are actually the most common adversary action, according to the 2023 IBM-sponsored Threat Intelligence...

Read Article

Six Stages of the Threat Intelligence Lifecycle

As the cyber threat intensifies, businesses have become ever more reliant on threat intelligence, or threat information that’s been aggregated,...

Read Article

Six Key Benefits of Security Management Software

Looking to manage security operations processes in a digital platform? Then, you’re looking for security management software, which covers a variety...

Read Article

Global Cyber Attacks Are Here: What to do?

If you thought major ransomware attacks were a thing of the past, after the Colonial Pipeline hit - think again. A sprawling, global cyber attack...

Read Article

The Three Key Threats to Corporate Security This Year

In today's business landscape security threats are increasing in number, intensity, and frequency for all organizations. But what are the top three...

Read Article

What is Cyber Resilience, and Why is it Important?

We hear so much about resiliency these days because of the cyber threat. According to Accenture, 68 percent of business leaders feel their...

Read Article

How Volatility in the Job Market Exacerbates the Insider Threat Risk

The post-COVID jobs market has been turbulent – and then some. And analysts have looked at this turbulence, most recently demonstrated by mass...

Read Article

ISO 27001 Has Changed: What’s new?

The international information security management system (ISMS) standard ISO/IEC 27001 was originally published in 2012. And much has changed in...

Read Article

What to Do about Increasing Cyber Compliance Risk

Ransomware as a service (RaaS) has become increasingly popular. The practice lets the malware author scale earnings while off-loading personal risk...

Read Article

Tips for Protecting Critical Infrastructure Assets

Lawmakers have spent the last few years ramping up protections for critical infrastructure assets. Many of those, though, predate the COVID surge....

Read Article
Request a Demo of Noggin
1 2 3 4 5