Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

Embracing New Alert Technology for More Effective Response

Embracing New Alert Technology for More Effective Response

How to embrace alert and notification technology in the age of risk and response.
Jim Romeo
April 1, 2017

Cleveland Ohio’s E Prep and Village Prep School has a system that notifies a parent when a student is absent.


Read More
RSA 2017: The "Culture" of Cybersecurity Collaboration

RSA 2017: The "Culture" of Cybersecurity Collaboration

Platform integration, centralized management and a holistic view of risk were recurring themes at RSA this year.
April 1, 2017

The 2017 RSA Cybersecurity Conference in San Francisco was more crowded than last year, if that’s even possible.


Read More
Airport Security: Active Shooter, Insider Threat, Terrorism and Protests

Airport Security: Active Shooter, Insider Threat, Terrorism and Protests

Airport security directors are always looking to beef up technology, improve employee training and work better with the TSA.
Ed Finkel
April 1, 2017

Airport security personnel spend most of their time preparing for active shooter incidents, insider threats and, in concert with the federal Transportation Security Administration (TSA), potential terrorist attacks. But on January 28, many of our nation’s largest airports had to handle an entirely different, unaccustomed scenario: mass protests over immigration policy.


Read More
Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

The Global Security Operations Center is not new, but its value is becoming widely recognized as a necessity to support business goals and operations.
diane-2016-200.jpg
Diane Ritchey
March 1, 2017

GSOC, SOC, VSOC, JSOC, NOC, INSOC... The possibilities are endless when it comes to a center, building, or facility that mitigates and responds to enterprise security issues, either within the U.S. or on a global level.


Read More
Insider Tips for Building Your Cybersecurity Team

Insider Tips for Building Your Cybersecurity Team

Don’t allow your biggest security vulnerability to be your lack of cybersecurity talent.
Tim McIntyre
March 1, 2017

Today’s center of gravity in cybersecurity is shifting, pulling the skills and experience of cyber defenders in new directions. In most companies, this situation has led to a convergence of responsibilities between physical security, information security and cybersecurity teams, and an increased commitment to “staffing-up” of dedicated “cyber defenders.”


Read More
Keeping Employees Cyber-Aware Keeps the Enterprise Cyber-Secure

Keeping Employees Cyber-Aware Keeps the Enterprise Cyber-Secure

Improving employees’ cybersecurity awareness often hinges on communicating those initiatives into risks they understand.
March 1, 2017

There’s a C- on your report card, but you’re not alone: The 2017 Global Cybersecurity Assurance Report Card found that the world’s information security practitioners gave global cybersecurity readiness an overall score of 70 percent – a six-point drop over 2016.


Read More
Testing Technology for Integrated Security Success

Testing Technology for Integrated Security Success

Choosing the right security system components takes time, effort and, often, outside expertise.
Claire Meyer
March 1, 2017

With so many security solutions on the market today, it can be tempting to chase the brightest new technologies to improve security operations in your enterprise.


Read More
Organized Retail Crime on the Rise; Perennial Challenges Remain

Organized Retail Crime on the Rise; Perennial Challenges Remain

Major retail chains are working to upgrade their systems, policies to combat loss prevention threats.
Ed Finkel
March 1, 2017

An inexplicable rise in organized retail crime during the past couple of years, perhaps due to police passivity, has major retailers looking to upgrade their equipment, technology, policies and procedures, and training for employees to combat loss prevention.


Read More
According to Dr. Park Dietz, while lots of companies have crisis management plans that kick into gear in an emergency

Do No Harm: Profiling Evil and Violence in the Workplace

What Dr. Park Dietz wants you to know about mitigating workplace violence, zero tolerance policies, OSHA’s potential legislation and more.
diane-2016-200.jpg
Diane Ritchey
February 1, 2017

Workplace violence is seldom the freak episode that the media portrays it to be. It rarely involves a mass shooting with a gun, and rarely does it result in a homicide or mass casualty.


Read More
Could Wearables and Big Data Mitigate Workplace Violence?

Could Wearables and Big Data Mitigate Workplace Violence?

One promising technology for predicting violent outbreaks is wearables and big data.
Barry Nixon
Barry Nixon
February 1, 2017

One of the most frequently asked question after a workplace violence incident has occurred is how could it have been prevented from occurring?


Read More
Previous 1 2 … 21 22 23 24 25 26 27 28 29 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing