Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Articles by Claire Meyer

Learning How to Manage Investigations

Conducting investigations within a security organization is very different than an episode of Miami Vice– from the timeframe to the interviews to, probably, the color of the investigator’s blazer. The process isn’t as thrilling as TV makes it out to be, but, as ACFE President and CEO James Ratley knows, that perception can work in your favor
Read More

How Dumpsters Cause Data Breaches

After a laptop breaks, where does it go? Your old work laptop, perhaps too slow to keep up with the growing pace of the Internet, is retired to the IT department, which issues you a nice, shiny new one. But what about all of your old files? Your data? Your client information?
Read More

Discovered by the TSA – 2012 Edition

People have always tried to get some interesting items past the TSA inspectors at U.S. airports, but 2012 brought some truly extreme items.
Read More

Balancing Perimeter Security and Visitor Management

Thief! Intruder! Birdwatcher? Sometimes, perimeter security puts you in contact with a variety of visitors, not all of them welcome, but how does one differentiate between visitors without making a bad first impression or creating a vulnerable situation? And how does that situation change based on a facility’s location and risk profile? Three security executives weigh in on the issue.
Read More

Increasing Security Officer Efficiency with Extra Training

Every job has new hire orientation – you get the employee handbook; discuss the dress code and benefits; take the tour of your new workplace. But for security officers, training usually doesn’t stop there. Security officers have to be the front line of an organization’s security force, prepared with all the tools necessary to handle the worst situations.

Read More

Managing Disaster Relief, Notification after Hurricane Sandy

Hurricane Sandy made landfall in New Jersey on October 29, 2012, crashing against the coastline of New Jersey before barreling into New York City and most of the upper East coast.
Read More

Securing Changing Perimeters at the Waterfront

When Daniel Casillo swam from his sinking jet ski in New York’s Jamaica Bay last August, he had no idea he was going to be at the center of a huge perimeter security breach.
Read More

Cutting Costs with Green Security Measures

It’s Easy Being Green,” “Got Green?,” “Green Saves the Planet”— Ecologically-friendly products have come a long way since the early 2000s, when every other newspaper headline touted the novelty of the movement by quoting Kermit the Frog.
Read More

Deciphering Security’s Alphabet Soup of Acronyms

Do you remember your first few weeks in the security industry, especially in its administration? What were the most confusing terms and acronyms for you to master? Well, we’ve been asking around for industry leaders to contribute their top acronyms for our alphabet soup so you can come back and reference what we mean by ASTM, HDIS and PIAM.
Read More

How to Hire the Right Security Integrator

Security integrators play an interesting and integral role in the security industry – they are part salesman, part customer service agent, part repairman, engineer, consultant… the list could continue. So with all of these competing roles, how do you, as a security executive, sort through the options to find a security integrator who will work with you in the long-term, not just plug in the cameras and walk away?
Read More



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security Magazine 2014 September cover

2014 October

Security takes a look at safety and preparedness for the harshest of weather phenomena in this October 2014 edition of the magazine. Also, we investigate supply chain security and the many benefits of PSIM. 

Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive


CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.