{"id":12,"date":"2013-12-15T23:45:34","date_gmt":"2013-12-15T21:45:34","guid":{"rendered":"http:\/\/www.axiomsec.com\/?page_id=12"},"modified":"2023-12-21T14:42:51","modified_gmt":"2023-12-21T12:42:51","slug":"home","status":"publish","type":"page","link":"https:\/\/www.axiomsec.com\/","title":{"rendered":"home"},"content":{"rendered":"<div class=\"su-divider su-divider-style-default\" style=\"margin:15px 0;border-width:1px;border-color:#fefefe\"><\/div>\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-3\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<p><a href=\"http:\/\/www.axiomsec.com\/?practiceareas=secutiry\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-443\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-security.png\" alt=\"icon-security\" width=\"64\" height=\"63\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-security.png 64w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-security-50x50.png 50w\" sizes=\"(max-width: 64px) 100vw, 64px\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><a href=\"http:\/\/www.axiomsec.com\/?practiceareas=secutiry\"><strong>SECURITY<\/strong><\/a><\/h2>\n<p style=\"text-align: center;\"><a title=\"Security\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=secutiry\">Security consultancy and project management<\/a><\/p>\n<p><a href=\"http:\/\/www.axiomsec.com\/?practiceareas=secutiry\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-514 size-full\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security-new.jpg\" alt=\"security service\" width=\"354\" height=\"296\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security-new.jpg 354w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security-new-300x251.jpg 300w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/a><\/div><\/div>\n<div class=\"su-column su-column-size-1-3\"><div class=\"su-column-inner su-u-clearfix su-u-trim\"><a title=\"Training\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=training-2\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-448 aligncenter\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-training.png\" alt=\"icon-training\" width=\"64\" height=\"63\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-training.png 64w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-training-50x50.png 50w\" sizes=\"(max-width: 64px) 100vw, 64px\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><a title=\"Training\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=training-2\">TRAINING<\/a><\/h2>\n<p style=\"text-align: center;\"><a title=\"Training\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=training-2\">Security courses and seminars<\/a><\/p>\n<p>\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=vn1tdcI0dLI\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-444\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security.jpg\" alt=\"home-trainning\" width=\"354\" height=\"296\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security.jpg 354w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-security-300x250.jpg 300w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/a><\/p>\n<\/div><\/div>\n<div class=\"su-column su-column-size-1-3\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<p><a title=\"DISSASTER MANAGEMENT\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=dissaster-management\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-451 aligncenter\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/icon-management.png\" alt=\"icon-management\" width=\"64\" height=\"63\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><a title=\"EMERGENCY MANAGEMENT\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=dissaster-management\">EMERGENCY MANAGEMENT<\/a><\/h2>\n<p style=\"text-align: center;\"><a title=\"EMERGENCY MANAGEMENT\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=dissaster-management\">Disaster preparedness, contingency and BC plans<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"DISSASTER MANAGEMENT\" href=\"http:\/\/www.axiomsec.com\/?practiceareas=dissaster-management\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-450\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/home-disaster.jpg\" alt=\"home-disaster\" width=\"354\" height=\"296\" srcset=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-disaster.jpg 354w, https:\/\/www.axiomsec.com\/wp-content\/uploads\/home-disaster-300x250.jpg 300w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/a><\/p>\n<\/div><\/div>\n<\/div>\n<div class=\"info_box\">\n<div class=\"span3 \"><a href=\"https:\/\/www.wincol.ac.il\/security\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/www.axiomsec.com\/wp-content\/uploads\/banner1.jpg\" alt=\"the homeland security academy\" width=\"230\" height=\"319\" \/><\/a><\/div>\n<div class=\"span4 \"><h3><a title=\"Supply chain and Loss prevention\" href=\"http:\/\/www.axiomsec.com\/?security=%D7%A9%D7%A8%D7%A9%D7%A8%D7%AA-%D7%94%D7%A1%D7%A4%D7%A7%D7%94-%D7%95%D7%94%D7%9E%D7%A0%D7%A2%D7%95%D7%AA-%D7%9E%D7%90%D7%91%D7%93%D7%95%D7%AA&amp;lang=he\">Loss prevention<\/a><\/h3>\n<p>Loss Prevention is a field of action that aims to enable the effectively control of the industrial, marketing and conveying processes together with the movements of funds, raw materials and products, in order to protect the organization's assets and vital interests against hostile elements attempts to damage them or to exploit them for their own benefit.<br \/>\nThese threats of criminal elements, whether they are coming from the inside of the organization, using personnel authorized to utilize its resources, and even if they are operating from the outside, existed since ancient times.<\/p>\n<p style=\"text-align: right;\"><a title=\"Supply chain and Loss prevention\" href=\"http:\/\/www.axiomsec.com\/?security=supply-chain-and-loss-prevention\">Continue Reading<\/a><\/p><\/div>\n<div class=\"span4 \"><h3><a title=\"articles\" href=\"http:\/\/www.axiomsec.com\/?cat=5\">Latest Articles<\/a><\/h3>\n<div class=\"wp-cpl-sc-wrap wp-cpl-sc-theme-2\">\n        <div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/www.axiomsec.com\/?p=933\" title=\"Permalink to: The Manchester Attack - Securing Events at a Crossroads\">The Manchester Attack &#8211; Securing Events at a Crossroads<\/a><\/h2>\n            <div class=\"wp-cpl-sc-entry\">\n        <p>\n            The suicide attack that took place this week (22\/5\/2017) in Manchester Arena brought us back to the horrors of the suicide bombing at the\u2026        <\/p>\n                <p class=\"wp-cpl-sc-readmore\">\n            <a href=\"https:\/\/www.axiomsec.com\/?p=933\">Continue Reading<\/a>\n        <\/p>\n            <\/div>\n        <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/www.axiomsec.com\/?p=896\" title=\"Permalink to: Aviation at gunpoint\">Aviation at gunpoint<\/a><\/h2>\n            <div class=\"wp-cpl-sc-entry\">\n        <p>\n            By Nir Ran\r\n\r\nTerrorist organizations around the world are divided into countless streams, motives, ideologies and action methods. Organizations with\u2026        <\/p>\n                <p class=\"wp-cpl-sc-readmore\">\n            <a href=\"https:\/\/www.axiomsec.com\/?p=896\">Continue Reading<\/a>\n        <\/p>\n            <\/div>\n        <div class=\"clear\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12"}],"version-history":[{"count":171,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":964,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions\/964"}],"wp:attachment":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}