Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2016 January

As enterprise security leaders gain access to more advanced and complicated security solutions, they’re also confronted with advanced and complicated risks. For as many security and surveillance applications that unmanned aerial vehicles have, for example, there are twice as many risks that unknown drones could pose to the enterprise. For every new IP camera added to the network, there is one new endpoint that could be vulnerable to a cyber attack.

The development of technology has always been a two-edged sword for security, but this report aims to keep you ahead of the game with advanced looks at forthcoming solutions, innovative case studies and recommendations from R&D experts, industry leaders and enterprise security executives.

  • Cover Story
  • Featured Articles
  • Columns
  • Departments

Cover Story

Back to Top

2016 Technology Report: New Security Solutions and Risks Go Hand-in-Hand

Security’s Tool Box: Bigger, Better and Sometimes Bad Edged
zalud-2016-200px.jpg
Bill Zalud
January 1, 2016

Technology moves quickly, as military and commercial tools and toys merge with security applications to create both new solutions and risks for the enterprise. What should you be on the lookout for this year?


Read More

Featured Articles

Back to Top

RSA Conference Preview: Using Actionable Intelligence to Keep Up

January 1, 2016

Actionable Intelligence Forms a Life Raft for Cybersecurity Efforts


Read More

Spotlight on Door Security: Modernizing Entry Control

January 1, 2016

Woodbine Entertainment Group has installed an entry control system that provides high-security entry control at an affordable cost.


Read More

Columns

Back to Top

6 Steps Toward a Better Cyber Risk Management Strategy

Chabinsky-2016-200px.jpg
Steven Chabinsky
January 1, 2016

Starting last August, we began the current series of articles to provide our readers with a deep dive into the NIST Framework and its approach to Identify, Protect, Detect, Respond to and Recover from cybersecurity incidents.


Read More

Surprise! You Just Stole a Bait Bike

diane-2016-200.jpg
Diane Ritchey
January 1, 2016

Somewhere between chopped locks and chop shops, victims of bike theft have been left without a ride on the University of Pennsylvania campus. 


Read More

Influence: Gaining Unique Insights

Mattice-2016-200px.jpg
Lynn Mattice
January 1, 2016

The previous three columns have laid the groundwork for establishing yourself as an effective influencer. In this month’s column, we will explore gaining the unique insights necessary to establish a program that will truly provide value to the enterprise.


Read More

Family-Affiliated Terrorism: From Paris to San Bernadino and Beyond

Dean C. Alexander
January 1, 2016

The horrific Islamic State-linked terrorist attacks in Paris in November 2015 illustrated another troubling reality: family-affiliated terrorism.


Read More

Departments

Back to Top

Beyond Compliance, Utilities Remain Vulnerable

January 1, 2016

While utility enterprises are taking steps to detect and deter physical security threats, preventing damage and enabling recovery remain significant challenges, according to The State of Physical Grid Security 2015.


Read More

How Effective Are Existing University Emergency Operations Plans?

January 1, 2016

Eighty-six percent of respondents in the Margolis Healy Campus Safety Survey 2015indicated that their university has developed an emergency operations plan that addresses threats specific to their institution.


Read More

Identity Thieves' Methods and Demographics are Changing

January 1, 2016

As identity theft and fraud become major moneymakers for criminals, the profile of a typical identity thief is changing


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

Coding

Epstein File Data Security Update: Raw Code Found in Emails

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing