Featured Stories

Using Architectural Elements for Stronger Security

When thinking of security, people tend to think of cameras, security officers and metal detectors.
April 1, 2014

A strong security infrastructure doesn’t always start with the technology, it starts with the blueprints – by working with architects and designers, security teams can build the best security plans before the bricks are even laid.


Read More

Mitigating Retail Shrink with Better Monitoring

It doesn’t matter where you are in the world retail theft is a cost of doing business.
April 1, 2014

Retail theft may be a cost of doing business, but intelligent surveillance strategies can help mitigate risks, improve insurance premiums and monitor employees.


Read More

Reviewing Emerging Insurance Protection for Cyber Risks

Are you covered in the event of a cyber breach?
April 1, 2014

If your enterprise is relying on its traditional all-hazards insurance plan to provide adequate cyber coverage, you might be dangerously mistaken.


Read More

How the Boston Marathon Bombing Changed the Game of Sports Security

One year ago, two bombs exploded at the Boston Marathon finish line, shocking the nation and driving international sporting event security changes
April 1, 2014

Now, new security protocols and a full year of planning and training guard the athletes, spectators and race course for the 2014 Boston Marathon. What did industry leaders take away from the incident?


Read More

Banking Battlegrounds: Cyber and Physical Security Risks Today

What reporting strategies should your enterprise adopt?
April 1, 2014

How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.


Read More

How to Leverage a GSOC for Unified International Security

Across one entire wall of the room are dozens of camera feeds.
March 1, 2014

Operators in the room are on their phones, either receiving or relaying information about security – physical and cyber-related events. Welcome to Exelon’s Security Operations Center (ESOC), with three entities: the ESOC, the Incident Command Center (ICC) and the Cyber Security Operations Center (CSOC).


Read More

ISC West 2014: New Technology Showcase

ISC West is fast approaching – April 2-4 – so while you’re booking your travel to the show, take a few moments to scope out what innovations you want to see for yourself.
March 1, 2014

Even if you can’t make it to Las Vegas for this year's show, there’s no reason you have to miss out on this year’s technology. Get a sneak peek of what will be shown and debuted at ISC West 2014.


Read More

Addressing Cyber and Physical Risks in Modern Utility Security

In early January, residents of Charleston, W. Va., found that their tap water had a licorice smell and a strong aftertaste, and it resulted in a number of people reporting a variety of ailments.
March 1, 2014

In early January, residents of Charleston, W. Va., found that their tap water had a licorice smell and a strong aftertaste, and it resulted in a number of people reporting a variety of ailments.


Read More

How Thermal Cameras Protect Critical Infrastructure

Thermal cameras have been a staple of popular culture media for decades, and it is now even available via smartphone.
March 1, 2014

But while the smartphone case, debuted at the 2014 Consumer Electronics Show, is marketed primarily for personal use, including identifying wildlife, detecting home energy loss or a variety of other practical and creative uses, thermal cameras remain a valuable investment for enterprise security leaders, even though you can’t fit them in your pocket.


Read More

Adding Badges to Save Budgets in Local Governments

Badging several thousand employees in several hundred different facilities can prove to be very complex.
March 1, 2014

Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

August 2014

2014 August

In the August issue of Security Magazine, read about the public-private partnerships and the future of DHS with Frank Taylor, sneak a peek at the ASIS 2014 security products, and read a special report on cyber risk and security. Also in this issue find out why America is in desperate need of a CSO and the most common mistakes in Cyber incident response. The security game has dramatically changed since September 11th, read about what enterprises are doing to keep Americans safe and sound.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+