Security Magazine

January Cover

View Archived Issues

2014 January

In the January 2014 issue of Security Magazine, read about the role of the Chief Information Security Officer and how important they are to your company. Find out how to prepare your company for a natural disaster, training your security officers to spot a fake ID, and read about the latest trends in security for the New Year! Also, find out how jury settlements have a big impact on your enterprise security.

Measuring the CISO's Evolving Sphere of Influence

They are the executives who control information security issues in an enterprise and are responsible for securing anything related to data.

The Chief Information Security Officer (CISO) not only protects IT systems with special hardware, software and secure business processes, but he or she also creates, implements and communicates the organization’s digital information security policies and procedures.


Read More

Balancing Technology and the Human Side of School Security

Columbine, Virginia Tech, Sandy Hook – These schools are household names around the U.S., but not necessarily for their academics, athletics or famous alumni.

Columbine, Virginia Tech, Sandy Hook – These schools are household names around the U.S., but not necessarily for their academics, athletics or famous alumni.


Read More

Training Security Officers for Better Access Management

There is a human factor of access control, and a correct way to train your enterprise’s security officers to perform this vital task.

To most people, the term “access control” refers to beeping key-card readers, little lights turning from red to green, doors unlocking and turnstiles opening, but access control also happens to be one of the most important duties that a security officer is tasked with.


Read More

Top Rewards of Small Business Surveillance

When it comes to surveillance, making an investment to protect the small business’s assets is a must, and it can help business owners reap unexpected rewards.

When it comes to surveillance, making an investment to protect the small business’s assets is a must, and it can help business owners reap unexpected rewards.


Read More

How RFID and NFC Technology Enhances the Enterprise

RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.

In the consumerization of IT, such as the Bring Your Own Device movement, employees and stakeholders want their services delivered according to their preferences, and more and more are demanding digital, high-tech solutions.


Read More

How Large Jury Settlements Affect Enterprise Security

Regardless of a jury settlement outcome, lawsuits and their resulting publicity leave a stigma and often result in loss of business, not to mention difficulty finding insurance coverage

A security executive’s primary strategy should be to prevent lawsuits from happening, so hiring practices and vetting of security firm partners are the first defense. All security officers must be subjected to criminal background and employment history checks.


Read More

How to Reduce the Insider Cyber Threat

To best protect your company against internal abuse, it is helpful to understand the nature of the threat and to consider applying risk-based approaches to address the problem.

Let’s start with the good news. Malicious insider activity is relatively rare. Unfortunately, even though outsiders account for 85 percent of cybersecurity incidents, the damage often is substantially greater when an insider strikes.


Read More

Updating Cyber Threats on the Radar for 2014

Small business doesn’t necessarily mean small data.

Small business doesn’t necessarily mean small data. In fact, according to Michael Bruemmer, vice president at Experian Data Breach Resolution, thieves prefer to target small- to medium­–sized businesses (SMBs) because many lack the resources or expertise to manage cybersecurity. Retailers are especially easy targets for cybercriminals who look to hijack credit card data, but customers aren’t the only victims.


Read More

Comparing Surveillance Options for SMBs, Enterprises

During the past 20 years, product technology within the analog security video industry had been very stable, with only minor product advances.

In the analog security video boom, end users’ surveillance needs were very similar, regardless of their company’s size, but today’s surveillance product technologies are rapidly changing this historical norm. The needs of small and midsized businesses (SMBs) are moving in the opposite direction of enterprises, where the surveillance needs are getting more closely aligned with the enterprise’s IT requirements.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.