Security Leadership and Management

How to Manage Physical Asset Risk

Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.
By Jerry Brennan and Lynn Mattice
No Comments

Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.


Read More

Social Media Forces Risk Management Changes in At-Risk Countries

No Comments

The speed at which political instability spreads is now inextricably linked to social media, as disaffected populations around the globe turn to this powerful outlet to drive demonstrations, according to a new Marsh Risk Management Research briefing, Social Media Heightens Political Risks in Emerging Markets.


Read More

Prosecutors Call for Updated White Collar Crime Laws

No Comments

New York's antiquated laws against public corruption, computer crimes and fraud -- including swindles targeting the elderly -- would be beefed up under a series of wide-ranging proposals.


Read More

The Most Influential People in Security 2013

Nominated by their colleagues and associates, these top enterprise security executives are changing the security landscape for the better.
No Comments

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.


Read More

Is Your Program Security Theater?

Is your department making the enterprise safer, or is it a false sense of security? Take our quiz to find out!
By Roger G. Johnston Ph.D. and Jon Warner PhD
No Comments

 Security guru Bruce Schneier coined the term “Security Theater” to describe phony security measures, procedures, or technologies that give the superficial appearance of providing security without actually countering malicious adversaries to any significant degree.  


Read More

How to Safeguard Your Information Assets

How are lapses in cyber security leading to the loss of billions of dollars worth of intellectual property?
By Jerry Brennan and Lynn Mattice
No Comments

In today’s “Internet of Everything,” most enterprises dramatically underestimate the extent and scope of cyber-based attacks.


Read More

How Female Terrorists Use Preconceptions to their Advantage

Male terrorists tend to get most of the press, but terrorist cells are recruiting more women, often due to security forces considering them less suspicious.
By Dean C. Alexander
No Comments

 The May 2013 edition of the FBI’s Most Wanted Terrorist Listincluded its first woman – Joanne Chesimard, wanted for the 1973 killing of a New Jersey State Trooper.  


Read More

How to Train Your Security Training Program

The foundation for creating a security department is risk evaluation and training, and taking training out of the binder and using it in the field could be the key to a thriving program.
By Shawn Reilly
No Comments

 No matter if you have a proprietary or contracted security force, these officers must be properly trained.  


Read More

Why CSOs Lose Their Influence and Get Fired

Your path to a pink slip might have started on day one – it’s failure in the soft skills that gets enterprise security executives fired.
By Claire Meyer
No Comments

You might already be on your way to a pink slip – according to industry experts, the termination process might begin before a CSO even starts work at a new enterprise.


Read More

5 Points to Securing the Global Enterprise

Large enterprises’ unique security and operational needs require a streamlined approach to technology deployment.
By Renae Leary
No Comments
When seeking effective security in the face of fast-evolving threats, large enterprises need assistance and a robust plan to address the challenges inherent to securing a global business. It is especially important to consider the following
Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+