Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Security Magazine

June 2014

View Archived Issues

2014 June

In the June issue of Security Magazine, read about how you can build a better brand for your enterprise, as well as how to control brand risk that goes with a product. Discover the 9 strategies you can use to protect your privacy from cyber space. Also, find out how to protect yourself from wearable technology- like smartwatches and Google Glass. Catch up on the latest news as well as the latest technology and products in the security industry.

Building Security's Brand for Better Buy-in

In a wired world that is also full of risk, an enterprise’s reputation can be destroyed in hours.

We share threat information throughout all areas of the organization, we coordinate response events, mitigating controls and we also report to our executive staff and regulatory group on incidents and events. My organization was formed to reduce reputational, financial, operational, and compliance related risks.”


Read More

Monitoring Operations from a Distance for Safer Operations

What are other ways that you can communicate use cases and savings to get buy-in from other departments?

Using cameras can provide a viable alternative, when combined with analytics, to bypass other infrastructure-heavy tools, such as adding fiberoptic cable to perimeter fencing to detect intruders or trenching for driveway sensors or barricades, giving Taminco and the security system an overall smaller footprint.


Read More

Future-Proofing with Smart Card Investments

The buzz around the Vanderbilt University Medical Center was that proximity cards were the next step in hospital security and data protection

While the system is indeed better protecting patient information, enabling students to access dormitories and laundry rooms, and even presents the possibility of connecting with point of sale systems across both the university and hospital campuses, one measurable impact of swapping technologies is the reduction in maintenance. 


Read More

Protecting SMB Investments with Electronic Access Control

Keys can be copied, codes can be shared, and investments can be lost

With programmable automatic locking from RS2 and local integrator Kendell Doors, however, Shanks can program the building’s doors to lock and unlock during various community or extracurricular events on the campus.


Read More

9 Strategies to Protect Privacy in Cyber Space

Privacy issues have long been a big concern when it comes to cybersecurity, but with major security breaches like the one Target experienced in December 2013

In the event of a breach, you need to have a written plan to take immediate steps and know who is going to analyze the problem, who will notify the people impacted by the breach, and who you can call for help, among other things.


Read More

How to Make Unreliable Video Reliable

At any given time, 30 percent of an IP video network does not work properly.

Viakoo detects and alerts customers to anything that threatens, degrades or stops a video stream from the camera across the network to the recording disks; every 20- minutes. It also points to the probable cause and what corrective action should be taken


Read More

Adopting Wireless Video to Tackle Covert Surveillance Operations

Crime and vandalism are down with wireless video.

The results have been amazing: over the course of six months, more than 100 arrests have been made for outstanding warrants, gun violations, underage drinking, drug possession and robbery. Crime and vandalism are down; hikers and bikers feel safe again visiting the area.


Read More

How to Plan for Emergency Response Success

Just because a natural, man-made or other type of disaster has never happened within your enterprise doesn’t mean it never will

The Indiana University System is currently undergoing FEMA’s Disaster Resistant University process, which helps higher education institutions identify specific campus risks, develop a risk assessment and build a platform for an all-hazards preparedness program.


Read More

Planning for a Safe and Secure 2014 World Cup

High-profile litigation has broadened the scope and understanding of the duty of care that companies owe to their employees traveling abroad.

The World Cup Games offer a unique opportunity for companies throughout the world – a month-long celebration of the world’s most popular sport in a region where it enjoys widespread support.


Read More

Protecting Data Against Wearable Technology Risks

Many tech giants have recently made a big push in wearable items.

An organization has to look at the whole picture when thinking about the risks and acceptable use policy regarding wearable technology.


Read More

Using Security Convergence to Enable the Enterprise

Enterprises realize tremendous benefits from this convergence as well as some serious downsides, but the trend is irreversible.

The concept of remote decision making, while necessary in 2000, is not necessary today. Let’s use the significant security and power of existing IT networks, let it all be managed by IT and let security get back to their primary job, deciding who should get in and responding to those who should not.


Read More

Lessons Learned from Security 500 Palo Alto

How little opex can you spend and still get the job done

Perhaps the most valuable learning from this panel was that there is not and may never be a “one size fits all” solution for our industry. While there are many economic and operational advantages to a single provider, there are also some risks associated with this model.


Read More

Facing an Uncertain Future in Cybersecurity Enforcement

The FTC has become the nation’s leading force to drive and enforce consumer privacy

In early May, the FTC’s Chief Administrative Law Judge held that in an enforcement action the FTC must disclose “what data security standards, if any” it has published and intends to rely upon to demonstrate that a company’s data security practices are not reasonable and appropriate.


Read More

Controlling Brand Risk

How the market perceives a company and its brand(s) ultimately dictates success or failure.

Constant vigilance in the marketplace is vital to understanding, responding to and mitigating incidents that can have a devastating impact on your enterprise’s brand and reputation.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

2014 November cover of Security Magazine

2014 November

Don't miss our 2014 Security 500 issue, with rankings, data on sectors, and other security benchmarkings, all contained within this November 2014 edition of Security magazine. Also, (re)learn the basics of lobby security and how to make the highest impact retrofit for your budget.
Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.