Security Magazine

March 2014

View Archived Issues

2014 March

In the March issue of Security Magazine, read how to leverage a GSOC for Unified International Security, sneak a peek at the ISC West 2014 technology and see how you can get realistic results from security technology. If you're traveling abroad, there are 24 easy steps to follow for data security, and traveling or not, this month we're giving you the top steps in handling an executive kidnapping.

How to Leverage a GSOC for Unified International Security

Across one entire wall of the room are dozens of camera feeds.
March 1, 2014

Operators in the room are on their phones, either receiving or relaying information about security – physical and cyber-related events. Welcome to Exelon’s Security Operations Center (ESOC), with three entities: the ESOC, the Incident Command Center (ICC) and the Cyber Security Operations Center (CSOC).


Read More

How Boston Hotels Are Adopting Twitter for Emergency Communication

Twitter allowed Boston’s hotels to communicate reliable information to their guests and employees.
March 1, 2014

The lessons learned following the Boston Marathon bombings were many, but one lesson that was learned rather quickly was that Twitter was going to become the go-to platform for gathering timely and accurate information from city, state and federal officials regarding the rapidly unfolding events of that week.


Read More

ISC West 2014: New Technology Showcase

ISC West is fast approaching – April 2-4 – so while you’re booking your travel to the show, take a few moments to scope out what innovations you want to see for yourself.
March 1, 2014

Even if you can’t make it to Las Vegas for this year's show, there’s no reason you have to miss out on this year’s technology. Get a sneak peek of what will be shown and debuted at ISC West 2014.


Read More

Preparing for Litigation with Good Documentation

Security planning, regardless of business sector, is a company’s best effort to provide a proactive system to protect property and lives.
March 1, 2014

Despite robust planning, a security director’s worst nightmare is a serious injury or death occurring on company property due to a violent criminal act.


Read More

Accounting for Local Hospitals in Emergency Preparedness

Hospital Incident Command Systems (HICS) are a component of security and emergency management that is often overlooked in many of the disaster plans in the United States.
March 1, 2014

Counterterrorist operatives perform drills on securing and neutralizing threats at major target areas. Although this is an extremely important concept to master, often ignored is one of the most important components in community disaster preparedness: the local area hospital.


Read More

Adding Badges to Save Budgets in Local Governments

Badging several thousand employees in several hundred different facilities can prove to be very complex.
March 1, 2014

Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.


Read More

How Thermal Cameras Protect Critical Infrastructure

Thermal cameras have been a staple of popular culture media for decades, and it is now even available via smartphone.
March 1, 2014

But while the smartphone case, debuted at the 2014 Consumer Electronics Show, is marketed primarily for personal use, including identifying wildlife, detecting home energy loss or a variety of other practical and creative uses, thermal cameras remain a valuable investment for enterprise security leaders, even though you can’t fit them in your pocket.


Read More

How Video Surveillance Prevents Crime in Dover, Delaware

Law enforcement agencies are tasked with the difficult job of keeping communities safe, a responsibility that never goes away.
March 1, 2014

Advancements in security technology, however, are giving law enforcement agencies an advantage in the fight against crime. Video surveillance has long been used as a deterrent and tool for capturing incidents as they occur, but recent innovations in IP-based cameras and wireless networks have made it even more practical for law enforcement applications.


Read More

Why Not to Hire an Ethical Hacker

When it comes to hacking, it’s black or white.
March 1, 2014

There are white hat hackers, black hat hackers and those who live in-between, in the grey area. White hat hackers are ethical computer hackers or security experts who specialize in penetration testing to make sure a system is truly secure.


Read More

Changing Security with Big Data, the Internet of Things and Social Media

In some sense, our security systems don’t really give us very much information
March 1, 2014

Recently, there was a mall shooting in which three people died about five miles from my home in Columbia, MD. My wife and I were to have been there getting her phone fixed in the exact part of the mall where the killings took place.


Read More

Earning Security Success by Monitoring the Marketplace

Knowing what is happening in the marketplace is vital to the success of your enterprise
March 1, 2014

Monitoring emerging trends, customer likes and dislikes, and understanding unmet customer needs can determine how rapid a rate of incline or decline your business experiences. Companies spend millions of dollars conducting surveys of customers, potential customers, industry experts and key opinion leaders to determine if their products or services effectively meet, exceed or miss market expectations.


Read More

Joining the Security Enterprise Mainstream

Security executives are placing more importance on the intangible value-adds that an integrator brings versus just looking for the low-bid provider.
March 1, 2014

Most security executives clearly understand cyber security is in a class by itself, and the risks associated with ignoring it are immeasurable. They are surrounding themselves with IT and technical security professionals instead of traditional security staffing and former law enforcement personnel.


Read More

Changing the Definition of Surveillance in the Age of Converged Risk

Surveillance deals with the act of carefully watching someone or something with the specific intent to prevent or detect a crime.
March 1, 2014

The role of the CSO has significantly changed in the past 10 years and will change even more drastically over the next 10. For example, mention “convergence” and lines begin to blur – lines demarcating previously clear-cut, albeit traditional areas of management responsibility, budgets, reporting hierarchies, resourcing needs and geography.


Read More

Checklist: 24 Steps for Data Security While Traveling Abroad

When traveling overseas, there is already plenty of work to do in terms of planning, packing and then actually traveling.
March 1, 2014

When we travel, the data we carry and our Internet habits can put our individual privacy and data security at risk.


Read More

The Top Steps to Handling An Executive Kidnapping

The most important step is to understand the level and type of kidnap risk in countries or regions where your organization operates or where employees are expected to travel for business reasons.
March 1, 2014

If your organization is operating in an area where the risk of kidnap is deemed high, you should consider the Special Risk options available through the insurance market. Carried by many leading underwriters, Kidnap/Ransom and Extortion (KRE) coverage reimburses the losses associated with a kidnap.


Read More

Why Cybersecurity is a Business Necessity

For well over a decade, CEOs have been relegating the operational, legal, reputational and competitive risks associated with cybersecurity to those responsible for Information Technology.
March 1, 2014

Cybersecurity is the unsung linchpin of every company that has grown increasingly dependent upon vulnerable technologies, whether to communicate, to store sensitive data, or to manufacture and deliver its products and services.


Read More

Getting Realistic Results from Security Technology

As the security industry heads to the largest technology trade show in the world, ISC West in Las Vegas, it is a great time to do an inventory and reflect on your security technology investments and systems
March 1, 2014

There will be more than 1,000 exhibits at ISC West plus another 100 or so new technologies and solutions presented in hotel suites and meeting rooms off the show floor. Robust discussion about the movement toward IP, mobility and the cloud will buzz across the show floor, as it should.


Read More

Working with Canines in Healthcare

No one is quite sure when humans first domesticated dogs, however, dogs and people have been working side by side for thousands of years.
March 1, 2014

Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

July 2014

2014 July

In the July issue of Security Magazine, read about how the NFL is balancing security with fan experience to make sure sporting events are running smoothly. If you're doing any traveling this summer, be sure to read the 5 hot spots for business travel security, also, employers can track on-the-go employees with new mobile apps. Also, check out the latest news and industry innovations for the security industry.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+