Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » infrastructure security

Articles Tagged with ''infrastructure security''

From Barricades to Booths, Balancing Convenience and Security

August 14, 2013
Low tech can play an essential security role in protecting many critical infrastructure sites.
Read More

Measuring those Security Threats

August 14, 2013
The U.S. Coast Guard employs a three-tiered system of maritime security levels (commonly called MARSEC), designed to easily communicate pre-planned scalable responses for credible threats.
Read More

Critical Port Hardens its Security Strategies

August 14, 2013
The Port of Tacoma is a significant economic engine, where double-digit growth in both imports and exports propelled a 16 percent gain in its 2012 container volumes. Breakbulk cargo volumes ended 68 percent higher for the year.
Read More

Iris Now No Longer at Rest

August 14, 2013
It’s official. An iris imaging option for Federal Personal Identity Verification (PIV) cards and an on-card fingerprint comparison option have been recommended.
Read More

Security as Part of Critical Infrastructure Business Plan

August 14, 2013
It is not a matter of collaboration over security technology as much as it is a sharing of the goals and vision inherent in the enterprise’s business plan.
Read More

Webinar Review: Critical Infrastructure: Protecting Various Sectors within One Business

August 14, 2013
In this webinar, Darin Dillon, business development manager at Convergint Technologies and Joe Olivarez Jr., vice president of enterprise security and crisis management at Baker Hughes Incorporated, talk about best practices the two companies developed together while working to protect various sectors within BHI, a supplier of oilfield services, products, technology and systems to the worldwide oil and natural gas industry.
Read More

Brake Pedal to the Metal – Copper Theft, That Is

August 13, 2013
With the region facing challenging economic times and the value of recycled copper rising, copper theft at Springfield, Mo.’s unmanned electricity substations was starting to rise at an alarming rate.
Read More

North to Alaska, Bells Are Ringing, and That’s Good

August 13, 2013
From retail stores to very, very remote wilderness huts, the Matanuska Telephone Association (MTA) provides its members reliable and competitively-priced telecommunications.
Read More

Alternative Energy, Unconventional Protection

August 13, 2013
Oil and natural gas pipelines. Electric transmission towers. Drinking water reservoirs. They are critical infrastructures but most often are protected by traditional security solutions.
Read More

Cloud Certification for Government Operations

August 13, 2013
The Cloud Security Alliance (CSA) announced in late July a number of milestones in its continued efforts to spearhead global transparency for cloud services.
Read More
Previous 1 2 … 9 10 11 12 13 14 15 16 17 18 19 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing