Security Leadership and Management

An “Ace” for Security

The U.S. Open that more than 700,000 fans enjoyed last year at the USTA Billie Jean King National Tennis Center bears, in many ways, little resemblance to the tournament started 129 years ago.


Read More

Cloud Security Knowledge 101

Cloud services are the next generation of information technology that enterprises must master. In order to mitigate the risk associated with the cloud, businesses, providers and users must invest the time and resources to properly understand how to secure their assets.


Read More

How Social Responsibility Improves Crisis Management

“The tragic events of today cannot be remedied with words. Our hearts go out to the victims and their families. You may be certain that although no one can predict tragedy, we have invested heavily to prevent or mitigate its consequences.”


Read More

Education at ISC West

Two educational tracks at ISC West, April 5-8, 2011 in Las Vegas, will provide information on collaboration between public and private organizations and security for houses of worship.
Read More

On the Track of OSAC: The Country-Council Chronicles -- Final Entry

Day 8: Baghdad/Amman/Home

 We arose before dawn to meet our Security Detail for the ride back to the airport. Although there appeared to be more than just a few large commercial craft parked at the gates of the International terminal, including a large 747, our selected mode of travel this morning was a C-130 managed by what‘s affectionately known as “State Air”. 


Read More

On the Track of OSAC: The Country-Council Chronicles

Day 7: Baghdad

The number of Private Security Companies operating in Baghdad is surprising and gives way to an appreciation of the magnitude of the mission. Meeting with all of them would have proven infeasible, so we advanced the next best thing by meeting with the President of the PSCAI (Private Security Company Association of Iraq).


Read More

On the Track of OSAC: The Country-Council Chronicles

Day 6 in Baghdad

Of the more than 7,000 OSAC constituent representatives, a growing number are non-governmental organizations (NGOs), faith-based institutions, or members of academia. 


Read More

iSecurity is March 2

The interaction is very cool. I love this set up.” “Searching for vendors products was very easy and quick.” “I could quickly move from booth to booth to look for new technology.”

Those are just some of the comments from past iSecurity virtual trade shows, a free online event designed to put the information you need, the people you want to network with and the solution providers you want to hear from at your fingertips.


Read More

The Canary in the Mine

Canaries can have a short but significant life in a coal mine. Significant because, in their traditional role, they were used to identify the dangerous and costly fumes known as methane and carbon monoxide which could cause the loss of the business of the mine, the brand of the mine owners, and the skilled human assets of their workers.
Read More

2011: Year of the OSAC

While the Security 500 report identifies the best programs, biggest investors and brightest leaders in 16 sectors, the fact remains that all of these organizations are inextricably entwined with smaller organizations across multiple supply chains.
Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security December 2014 issue cover

2014 December

This issue of Security Magazine covers our 12th annual Top Guarding Firms list. Check out the best of the best as of December 2014. The 21st century has brought with it new types of security threats. Read how to combat and protect against these threats.

Table Of Contents Subscribe

Security Emergency Preparedness Training

Which security personnel emergency preparedness training is the top priority to you and your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.