Security Magazine

January Cover

View Archived Issues

2014 January

In the January 2014 issue of Security Magazine, read about the role of the Chief Information Security Officer and how important they are to your company. Find out how to prepare your company for a natural disaster, training your security officers to spot a fake ID, and read about the latest trends in security for the New Year! Also, find out how jury settlements have a big impact on your enterprise security.

Measuring the CISO's Evolving Sphere of Influence

They are the executives who control information security issues in an enterprise and are responsible for securing anything related to data.
January 6, 2014

The Chief Information Security Officer (CISO) not only protects IT systems with special hardware, software and secure business processes, but he or she also creates, implements and communicates the organization’s digital information security policies and procedures.


Read More

Balancing Technology and the Human Side of School Security

Columbine, Virginia Tech, Sandy Hook – These schools are household names around the U.S., but not necessarily for their academics, athletics or famous alumni.
January 6, 2014

Columbine, Virginia Tech, Sandy Hook – These schools are household names around the U.S., but not necessarily for their academics, athletics or famous alumni.


Read More

Training Security Officers for Better Access Management

There is a human factor of access control, and a correct way to train your enterprise’s security officers to perform this vital task.
January 6, 2014

To most people, the term “access control” refers to beeping key-card readers, little lights turning from red to green, doors unlocking and turnstiles opening, but access control also happens to be one of the most important duties that a security officer is tasked with.


Read More

Top Rewards of Small Business Surveillance

When it comes to surveillance, making an investment to protect the small business’s assets is a must, and it can help business owners reap unexpected rewards.
January 6, 2014

When it comes to surveillance, making an investment to protect the small business’s assets is a must, and it can help business owners reap unexpected rewards.


Read More

How RFID and NFC Technology Enhances the Enterprise

RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.
January 6, 2014

In the consumerization of IT, such as the Bring Your Own Device movement, employees and stakeholders want their services delivered according to their preferences, and more and more are demanding digital, high-tech solutions.


Read More

How Large Jury Settlements Affect Enterprise Security

Regardless of a jury settlement outcome, lawsuits and their resulting publicity leave a stigma and often result in loss of business, not to mention difficulty finding insurance coverage
January 6, 2014

A security executive’s primary strategy should be to prevent lawsuits from happening, so hiring practices and vetting of security firm partners are the first defense. All security officers must be subjected to criminal background and employment history checks.


Read More

How CSOs Can Prepare for Inevitable Natural Disasters

At the core of risk and resilience planning is the ability to gather intelligence and create situational awareness.
January 6, 2014

At the core of risk and resilience planning is the ability to gather intelligence and create situational awareness.


Read More

How to Reduce the Insider Cyber Threat

To best protect your company against internal abuse, it is helpful to understand the nature of the threat and to consider applying risk-based approaches to address the problem.
January 6, 2014

Let’s start with the good news. Malicious insider activity is relatively rare. Unfortunately, even though outsiders account for 85 percent of cybersecurity incidents, the damage often is substantially greater when an insider strikes.


Read More

Updating Cyber Threats on the Radar for 2014

Small business doesn’t necessarily mean small data.
January 6, 2014

Small business doesn’t necessarily mean small data. In fact, according to Michael Bruemmer, vice president at Experian Data Breach Resolution, thieves prefer to target small- to medium­–sized businesses (SMBs) because many lack the resources or expertise to manage cybersecurity. Retailers are especially easy targets for cybercriminals who look to hijack credit card data, but customers aren’t the only victims.


Read More

Comparing Surveillance Options for SMBs, Enterprises

During the past 20 years, product technology within the analog security video industry had been very stable, with only minor product advances.
January 6, 2014

In the analog security video boom, end users’ surveillance needs were very similar, regardless of their company’s size, but today’s surveillance product technologies are rapidly changing this historical norm. The needs of small and midsized businesses (SMBs) are moving in the opposite direction of enterprises, where the surveillance needs are getting more closely aligned with the enterprise’s IT requirements.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

July 2014

2014 July

In the July issue of Security Magazine, read about how the NFL is balancing security with fan experience to make sure sporting events are running smoothly. If you're doing any traveling this summer, be sure to read the 5 hot spots for business travel security, also, employers can track on-the-go employees with new mobile apps. Also, check out the latest news and industry innovations for the security industry.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+