• Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Industry Innovations
    • Security Blog
    • eNewsletter
  • Management
    • Enterprise Services
    • Leadership Management
    • Logical Security
    • Security & Business Resilience
    • Security Education & Training
    • Leadership & Management Column
    • Overseas and Secure Column
    • Profiles in Excellence
    • Security Talk Column
  • Physical
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • New Technology Products
    • Case Studies
    • Surveillance Strategies
  • Cyber
    • Cyber Security News
    • New Cyber Security Products
    • Case Studies
    • Cyber Tactics
  • Services
    • New Services Products
    • Case Studies
  • Sectors
    • Arenas / Stadiums / League / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Critical Infrastructure
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Ports: Sea, Land, & Air
    • Retail, Restaurants, Convenience Stores
    • Transportation/Supply Chain/Warehousing
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
    • Web Exclusives
  • Events
    • Industry Events
    • Webinars
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
    • Videos
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
  • Contact
  • Advertise
  • Subscribe

Social Media in Corporate Security: Using Social Media to Secure Employees, Assets and Your Bottom Line

Latest News

Two-Thirds of Business Decision Makers Expect to Suffer an Information Security Breach

The majority of business decision makers admit that their organization will suffer an information security breach and that the cost of ...

The Changing Cybersecurity Landscape in 2016

In the past few years a number of high-profile data breaches have garnered widespread media attention resulting in greater general scruti...

Court Rules Security Officers Should Have Reported Theft

An appeals court has reinstated the convictions of two former employees of New Brunswick Parking Authority for failing to report or pre...

White House to Hire its First CISO

The White House is seeking to hire its first chief information security officer (CISO).

Security Scholar Program to Debut at RSA® Conference 2016

RSA® Conference announces the RSA Conference Security Scholar program – a new initiative sponsored by RSA to connect the brig...

Nearly 80 Percent of German Organizations Aren’t Prepared for a Cyber Security Incident

The latest research on Cyber Resilience from the Ponemon Institute shows that 79 percent of security executives reported that they aren...

Report Lists the Most Dangerous Cities in the US

East St. Louis, Illinois and Camden, New Jersey rank first and second in an annual ranking of the country's most dangerous cities. ...

Tweets by @securitymag

See More News
Citysecurity_enews
Government: Federal, State and Local

Taking Situational Awareness to a New Level: Innovation, Technology and Citizen Stakeholders

Kevin Wine
With data production expected to be 44 times greater in 2020 than in 2009, city and public safety officials must be able to pull relevant information from multiple systems and …
Sec0216-cover-feature-slide1_900px
Cyber Security News

Breaking the Cybersecurity Glass Ceiling

Diane-200
Diane Ritchey
When it comes to talent, the security industry and the business world are missing out on an under-tapped source. …
Sec0216-mass-feature-slide1_900px
Identity Management

Finding Control and Accountability through Mass Notification

Claire-200px
Claire Meyer
Faster response in an emergency may depend on forethought and long-term planning. …
Sec0216-intercoms-feature-slide1_900px
Physical Security

Using Intercoms to Protect Vulnerable Families

Claire-200px
Claire Meyer
For transition-age youth (16-25), the Lighthouse Transitional Living Program can be a vital lifeline.  …
Sec0216-tools-feature-slide1_900px
Physical Security

Streamlining Guard Tours with Technology

Claire-200px
Claire Meyer
A security officer is often one of the most expensive and necessary tools in a security leader’s arsenal, but new technology is helping to maximize the investment. …
Sec0216-thermal-feature-slide1_900px
Video Surveillance

Heat, Light and Detection: The Future of Thermal Cameras

Zalud-200px
Bill Zalud
The thermal camera bottom line is accurate detection, clarity and quality of image. …
Sec0216-parking-feature-slide1_900px
Access Management

Determining Responsibility in Parking Lot Security

Zalud-200px
Bill Zalud
Not every parking lot or garage is the same, nor do any have the same needs to mitigate risks. It all boils down to a fundamental but complex word that …
Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
More Videos
2016 Editorial Calendar

2016 Editorial Calendar

After the EMV Bubble Burst, 3 Problems Persist
Retail/Restaurants/Convenience

After the EMV Bubble Burst, 3 Problems Persist

Seth Ruden Sr.
So, here we are, living in the “future”… many of us now finally have chip cards; the G20 nations are all in the post “liability-shift” world; we’re all expecting to be living in the new paradigm.

Blogs

Samurai-900

Learning Security Management from the Samurai

By Frank Kerns
In today’s volatile world, providing a secure environment is, of course, a top priority. The ability to employ and understand performance metrics, imaging technology and advanced security systems, is imperative if we are to provide a safe and secure world.

9 Ideas to Create a Professional Incident Report Stylebook

By Frank Kerns

When Pop Culture Drives Mobile App Development, What Happens to the Security of User Data?

By Carl Herberger
Influence: Putting Your Insights to Use
Security Leadership and Management

Influence: Putting Your Insights to Use

Mattice-200px
Lynn Mattice

The four previous columns in this series were designed to help prepare you for collecting vital insights into the views of senior executives and key leaders across your enterprise. 

Measuring Up Career Competition from the Public Sector
Security Leadership and Management

Measuring Up Career Competition from the Public Sector

Brennan-200px
Jerry J Brennan

As many of you have observed, a number of executive roles leading corporate security department are filled by senior-level federal government officials from the law enforcement, intelligence and military communities who are retiring and seeking a second career.  

Limiting Access Is the First Step to Securing Networks
Cyber Tactics

Limiting Access Is the First Step to Securing Networks

Chabinsky-200px
Steven Chabinsky

As part of our continuing series on the NIST Framework, we completed our review of the “Identify” category last month.  

Almost Half of Boards Lack Real Understanding of Cyber Threat
Cyber Security News

Almost Half of Boards Lack Real Understanding of Cyber Threat

A new survey found that 45 percent of cyber security professionals believe their board of directors have a major gap in their understanding of cyber risk, or simply don't understand the risk at all.
 

Security Magazine

Security Magazine February 2016 cover, Security Leadership: Breaking Stereotypes to Find the Next Great CISO

2016 February

In the hunt for the next great cybersecurity leaders, are enterprises neglecting an under-tapped source? More women are joining the cybersecurity industry, but there are still myriad opportunities for enterprise security leaders to be advocates and mentors to up-andcoming talent.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
  • Want More
    • Connect
    • Partners

Copyright ©2016. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing