Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » national security

Articles Tagged with ''national security''

China to Begin Investigating IT Service, Product Providers

May 22, 2014

China will investigate providers of IT products and services to protect “national security” and “economic and social development,” according to the official Xinhua news agency. This move follows the U.S. government charged five Chinese military officers with hacking U.S. companies to steal trade secrets.


Read More

35 Countries Pledge to Boost Nuclear Material Security

March 25, 2014

Thirty-five countries pledged Tuesday to turn international guidelines on nuclear security into national laws, including France, Britain, Canada and Israel. This move is aimed at preventing terrorists from acquiring nuclear material. The initiative also commits countries to open up their security procedures to independent review – a further step toward creating an international legal framework to mitigate risks of nuclear terrorism.


Read More

U.S. Border Agents Directed to Restrain Aggression Against Rock-Throwers

March 11, 2014

The U.S. Border Patrol told its agents Friday that when they confront suspected illegal immigrants crossing the frontier who throw rocks a them, they should try to take cover or move away instead of immediately opening fire.


Read More

Cyberattacks Advance to Top of Terror Threat List, Defense Leaders Say

January 6, 2014

Defense officials see cyberattacks as the greatest threat to U.S. national security, a survey released Monday says. Forty-five percent of respondents to the Defense News Leadership Poll named a cyberattack as the single greatest threat – nearly 20 percentage points above the second ranked threat: terrorism.


Read More

DHS Names New CIO

December 19, 2013

Luke J. McCormack has been named the new Chief Information Officer (CIO) for the Department of Homeland Security. McCormack will lead and oversee DHS’s continuing efforts to implement information technology enhancements and security.


Read More

Panel to Propose Dramatic Overhaul of NSA Surveillance Practices

December 13, 2013

Following the controversial disclosures of National Security Agency surveillance practices, a presidential task force is on the verge of proposing a dramatic overhaul of the agency, CBS News reports. The task force’s draft report is due Sunday, and will be released for public review before the end of the year. The goal, the article says, is to roll out the new NSA procedures in January, most of which will be enacted through internal administration procedural changes.


Read More

Tech Titans Call for Transparency, Controls over Government Surveillance

December 9, 2013

Eight major technology companies, including Google, Facebook and Twitter, are joining forces to call for tighter controls on government surveillance, according to The Associated Press. The companies say in an open letter to President Barack Obama that while they sympathize with national security concerns, recent revelations make it clear that laws should be carefully tailored to balance them against individual rights.


Read More

Survey: Counter-Terrorism Outweighs Defending Democracy Abroad

December 5, 2013

Protecting the United States from terrorism means more to Americans than promoting democracy abroad, a Pew Research Center study found. Since the Sept. 11, 2001 terrorist attacks, Americans consider protecting U.S. shores from terrorism a top priority, according to a UPI report. The study, conducted every four years, found 83 percent of those questioned held that opinion in 2013, which is slightly down from its high of 86 percent in 2005.


Read More

Report: Thousands of Tax Delinquents Have Security Clearances

November 13, 2013

Thousands of tax delinquents, including one who owes the IRS $2 million, have sensitive security clearances, posing a risk that has gone undetected by federal agencies, congressional investigators will report this Thursday.


Read More

DHS and DoD Working to Unify Cyber Security System

November 7, 2013

Amid calls for stronger cyber security laws, the Department of Homeland Security is working on getting its threat-tracking system to work across its own operations and the Department of Defense. An October 24 memo from the Office of the Inspector General found that although the DHS can keep track of threats and provide updates on ongoing issues, “federal cyber operations center do not have a common incident management system tool that tracks, updates, shares, and coordinates cyber information with each other.”


Read More
Previous 1 2 … 12 13 14 15 16 17 18 19 20 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing