Scenes from CSOonline's tour of Hoover Dam security operations. Power CenterHydro-electric generators at the Hoover Dam.Down Below, Where Tourists Don’t GoThe dam holds back the water of Lake Mead and is the focal point of security efforts. Seen from the bottom of the facility, an area off-limits to tourists.Under The BridgeThe under-construction Hoover Dam Bypass can be seen on the approach to the dam, just past where traffic slows on the approach to the security checkpoint.One of Many Security LayersCones like these were evident along the approach to the dam, as were other barriers. Traffic ControlVehicles pass over the dam. Luggage-carrying buses and several kinds of trucks are prohibited from using this road due to security concerns.You’ve Been WarnedSigns throughout the area remind tourists that security is present. Tools of the Security TradeVehicles outside the Hoover Dam police station. Much of the substation in the background is inactive but remains as a historical feature. These areas are constantly watched from the screens of the security command center.Tour GuidePeter Gregson, Regional Security Officer for Reclamation, gave CSOonline a tour of the Hoover Dam.Security HubThe police stationElectronic GuardAn access control reader outside one of the elevator shafts leading into the dam and below.Sensitive AreaA workshop located near the hydro-electric generators.Exclusive TourGregson shows us more behind-the-scenes equipment. LifelinePiping in a tunnel opening at the bottom of the dam.PathwaysOne of many tunnels inside the dam.CheckpointA Visitor Center security checkpoint with x-ray and metal detector.You’ve Been Warned AgainSigns throughout the area remind tourists of the importance of security. Threatened ResourceLake Mead, the largest reservoir in the U.S., created by the damming of the Colorado River.See more image galleriesCopper theft epidemic: Photos from the field in DetroitSpy tools: what private investigators use to sleuthATM skimming: what to watch for at the bank machineTimeline of data breaches: Four years since Choicepoint Related content feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Intrusion Detection Software Intrusion Detection Software feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe