Security Magazine

April 2014

View Archived Issues

2014 April

In the April issue of Security magazine, read about integration partnerships and their growing success. The Boston Marathon bombing has changed the way integrators look at security for sporting events, see where they are one year after the tragic incident. Read about the 2014 RSA conference and this year's theme of "Threat Intelligence. Also, read about the latest products and news in the security industry.

Adding Value with Long-Term Integrator Partnerships

How can CSOs get the most out of their security systems integrator partnerships?
April 1, 2014

Find out how six enterprise security leaders are working with their long-term integrators to save money, reduce downtime and mitigate risk.


Read More

Mitigating Retail Shrink with Better Monitoring

It doesn’t matter where you are in the world retail theft is a cost of doing business.
April 1, 2014

Retail theft may be a cost of doing business, but intelligent surveillance strategies can help mitigate risks, improve insurance premiums and monitor employees.


Read More

Using Architectural Elements for Stronger Security

When thinking of security, people tend to think of cameras, security officers and metal detectors.
April 1, 2014

A strong security infrastructure doesn’t always start with the technology, it starts with the blueprints – by working with architects and designers, security teams can build the best security plans before the bricks are even laid.


Read More

How Remote Monitoring Adds Value from Afar

Remote monitoring services in intelligent buildings will continue to grow in usage during the next few years.
April 1, 2014

An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?


Read More

RSA Review: Converged Risk and the Internet of Things

The 2014 RSA Conference this February in San Francisco highlighted the theme of “Threat Intelligence.”
April 1, 2014

Security intelligence and changes in the nature of security risk were driving conversations and solutions at the 2014 RSA Conference – What will your C-Suite want to know?


Read More

How Incident Reporting Can Mitigate Threats

What reporting strategies should your enterprise adopt?
April 1, 2014

How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.


Read More

How the Boston Marathon Bombing Changed the Game of Sports Security

One year ago, two bombs exploded at the Boston Marathon finish line, shocking the nation and driving international sporting event security changes
April 1, 2014

Now, new security protocols and a full year of planning and training guard the athletes, spectators and race course for the 2014 Boston Marathon. What did industry leaders take away from the incident?


Read More

Reviewing Emerging Insurance Protection for Cyber Risks

Are you covered in the event of a cyber breach?
April 1, 2014

If your enterprise is relying on its traditional all-hazards insurance plan to provide adequate cyber coverage, you might be dangerously mistaken.


Read More

Banking Battlegrounds: Cyber and Physical Security Risks Today

What reporting strategies should your enterprise adopt?
April 1, 2014

How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.


Read More

Views from a Top Integrator

Kratos PSS provides rapidly evolving technologies such as digital video analytics, LAN/WAN convergence and wireless solutions.
April 1, 2014

Kratos Public Safety & Security Solutions’ Robert Gaulden discusses the latest trends in security technology and how to manage surveillance for rooftop helipads.


Read More

Testing Wireless Security Awareness at RSA

In February, a crowd of cybersecurity professionals attended the RSA Conference in San Francisco.
April 1, 2014

Kent Lawson, founder of Private WiFi, decided to test the wireless network provided at the RSA Conference, and he was surprised at the large amount of completely unprotected communications from security professionals, discovered in a mere 15 minutes.


Read More

Top 5 Recommendations for International Active Shooter Risk Mitigation

Active shooter incidents continue to occur around the world as the most disturbing type of a workplace violence incident.
April 1, 2014

Workplace violence incidents are not isolated to any one country, so global enterprises should maintain plans for active shooter or workplace violence events for each country of operations. Learn where to start with these top five universal recommendations.


Read More

Measuring the Role of Risk Transfer in Cybersecurity Management

Recent events have catapulted cyber threats from a compartmentalized CISO responsibility to a boardroom discussion about director liability.
April 1, 2014

An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?


Read More

Elevating Cybersecurity to the C-Suite Before a Breach

Leading organizations are moving to the single office of the CSO and incorporating all aspects of security under a single leader, mission and plan.
April 1, 2014

Changing your organizational culture is the key to aggressively protecting your stakeholders’ information – how can involving your C-Suite make all the difference?


Read More

Using NIST for Easier Cybersecurity Management

Corporate executives can develop enough expertise to comfortably navigate key cybersecurity risk management concepts
April 1, 2014

The National Institute of Standards and Technology’s cybersecurity framework is now available, so how can CSOs and CISOs use it to better frame their cyber efforts and prove their case to the C-Suite?


Read More

How to Keep Up with Emerging Technologies and Risks

consumers hundreds of billions of dollars annually. In the United States, credit card fraud resulting from cyber intrusions has skyrocketed.
April 1, 2014

Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

THE MAGAZINE

Security Magazine

April 2014

2014 April

In the April issue of Security magazine, read about integration partnerships and their growing success. The Boston Marathon bombing has changed the way integrators look at security for sporting events, see where they are one year after the tragic incident. Read about the 2014 RSA conference and this year's theme of "Threat Intelligence. Also, read about the latest products and news in the security industry.

Table Of Contents Subscribe

Background Checks

Who conducts background checks on new employees and contractors in your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13