Security Leadership and Management

The Most Influential People in Security 2014

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.
By Diane Ritchey
No Comments

This year’s Most Influential is organized by five categories: Corporate Security Practitioners, Public Sector Security, University/Think Tanks, Cybersecurity and State/Local Government Security.


Read More

How to Adjust Security for Hazardous Locations

Many enterprises are looking beyond the U.S. shores to expand into emerging markets.
By Claire Meyer
No Comments

Employees traveling abroad often want to spend off-hours and weekends sightseeing, but that doesn’t mean that enterprises can lose track of them during that time.


Read More

Dow Corning Battles Counterfeiters of its Silicone Sealants

No Comments

 As part of an ongoing effort by government authorities across China to crack down on counterfeiting, law enforcement authorities in Wuxi, Jiangsu Province, broke up a counterfeiting ring selling fake Dow Corning silicone sealant. 


Read More

The Future of DHS Partnerships with Frank Taylor

In its recent Quadrennial Homeland Security Review, the Department of Homeland Security outlined its strategies for becoming a more integrated and agile agency
By Diane Ritchey
No Comments

Ultimately, with a public-private partnership, what you put in is what you get out, says Wesley Bull, Senior Director/Head of Global Protective Services at NVIDIA, a company that invented the GPU – the engine of modern visual computing.


Read More

Extending Dignity and Respect to Security Officer Contracts

Virtually every company will have a statement of some kind extolling the senior leadership’s commitment to treating people with dignity and respect.
No Comments

Another thing to consider is that cleaning crews and security officers generally have unfettered after-hours access in most companies and are doing their work when virtually no one from the company is around to oversee them.


Read More

Why America Needs a CSO

The loss of intellectual property due to theft by China costs the U.S. more than $300 billion annually and translated into 2.1 million fewer jobs in this country.
By Mark McCourt
No Comments

The office of U.S. Senator Tom Coburn of Oklahoma found that 25 percent of approved disability claims should have never been approved and another 20 percent are highly questionable.


Read More

WMATA Sued Over Criminal Background Check Policy

No Comments

Nine plaintiffs filed a class-action lawsuit against the Washington Metropolitan Area Transit Authority aleging that WMATA's "comprehensive" criminal background check policy.


Read More

Gartner: 2015 Will See Development of Digital Risk Officer Role

No Comments

More than half of Chief Executive Officers will have a senior digital leader role in their staff by the end of 2015. However, the duties of a Digital Risk Officer would be very different than a chief information security officer (CISO). 


Read More

ASIS Foundation Releases Security Performance Metrics Research Report

No Comments

The ASIS Foundation has released a major metrics research report and security metrics tool.


Read More

Managing Risk Across the Enterprise

The key to the risk-based security program is that no matter what issue you examine, every one of them affects the reputation of the enterprise in one manner or another.
By Jerry Brennan and Lynn Mattice
One Comment

Once the risk matrix has been populated, management must then prioritize the risks and determine which are the most critical to the viability, survivability and resilience of the enterprise. When that prioritization has been completed, various functions within the organization can be tasked to design the appropriate solution for the risk involved.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

August 2014

2014 August

In the August issue of Security Magazine, read about the public-private partnerships and the future of DHS with Frank Taylor, sneak a peek at the ASIS 2014 security products, and read a special report on cyber risk and security. Also in this issue find out why America is in desperate need of a CSO and the most common mistakes in Cyber incident response. The security game has dramatically changed since September 11th, read about what enterprises are doing to keep Americans safe and sound.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+