Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » security intelligence

Articles Tagged with ''security intelligence''

leadership

Insider Threat Programs: A Beginner’s Guide

Frank Figliuzzi - Security Magazine
Frank Figliuzzi
January 22, 2018

What your company spent years to develop can be lost in an instant at the hands of one bad intentioned employee.


Read More
The Benefits of Integrating Intelligence and Investigative Analysis - Security Magazine

The Benefits of Integrating Intelligence and Investigative Analysis

Convergence has been top of mind for years, but what about unifying security intelligence and investigations?
Daniil Davydoff
Daniil Davydoff
January 8, 2018
Institutions pursuing this kind of integration are in a better position to manage risk and are better able to cultivate employee development.
Read More
social-snaptrends

The Social Media Security Problem for Corporations around the World

Nate Pruitt
May 10, 2016
American Airlines once received a tweet from someone with the Twitter handle @QueenDemextriax_, reading in part, “I’m part of Al Qaida and on June 1st I’m gonna do something really big.”
Read More
Collective Intelligence: Turning Big Data into Action @ RSA 2016

RSA 2016: It's Time to Turn Big Data into Action

May 1, 2016

The big news at this year’s RSA show was big data and the Cloud.


Read More
citysecurity

Taking Situational Awareness to a New Level: Innovation, Technology and Citizen Stakeholders

Kevin Wine
February 9, 2016
With data production expected to be 44 times greater in 2020 than in 2009, city and public safety officials must be able to pull relevant information from multiple systems and apply big data analysis to make sense of it all.
Read More

RSA Conference Preview: Using Actionable Intelligence to Keep Up

January 1, 2016

Actionable Intelligence Forms a Life Raft for Cybersecurity Efforts


Read More

Survey Says Government is the Biggest Cybersecurity Threat

October 3, 2015

A new survey says that government is the target of cybercriminals and nation state attackers, citing the OPM security breach as an example.


Read More

6 Reasons Why Content is King in Command Centers

Ian Clemens
September 15, 2015
Building or upgrading a command center usually starts with facilities and equipment – ergonomic desks and chairs, LED displays and computers – as opposed to the content that supports the mission of command center staff.
Read More

Uses Location-Tagged Data to Gather Social Intelligence

September 1, 2015

This updated social media monitoring and analysis platform enables the use of location-tagged data to discover, engage and analyze content across Twitter, Instagram, Facebook, YouTube, Picasa, Flickr, Sina Weibo and other social media channels.


Read More

How to Use Smarter Surveillance to Close Intelligence Gaps

Bob Liscouski
April 1, 2015

The ISIS-inspired terrorist attacks in Paris in January and the threats against shopping malls in the U.S., Canada and the UK by Al-Shaabab highlight threats that call for more fully integrated surveillance solutions to enhance security. The horrifying Paris attacks demonstrated that, while various forms of video were available to record the attackers’ movements during and after the attack, the video wasn’t being made available in real time or near real time to help law enforcement’s response to the attack.


Read More
Previous 1 2 3 4 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing