This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

SEC1018-note-Feat-slide1_900px

How Mass Notification Tools Can Help Improve Workplace Safety

Patscheckel
Pat Scheckel
February 28, 2020
While many workplaces have certain safety measures in place, many lack a cohesive system for alerting and managing situations.
Read More
key-enews

How CSOs Can Strategically Keep Security on the Map

Part 1
Pocica headshot
Bob Pocica
February 25, 2020
Chief Security Officers (CSOs) are charged with protecting an organization’s assets and people. Like all corporate functions, the design of this department will vary greatly depending upon the organization. However, the process by which a program is designed, measured and evaluated has some consistent principles across different industries. This series explores how to make your physical security program more strategic, and how to secure funding for this objective.
Read More
SEC0919-Assurance-Feat-slide1_900px

Unprepared for CCPA? It Could Cost Your Organization

Here’s how to achieve compliance and potentially cut costs at the same time
Safi Raza
February 25, 2020
Studies and surveys consistently show that cybersecurity and data protection is one of the top five concerns of internal auditors, who worry that their organizations lack the internal resources to deal with security risks. On January 1, 2020, the California Consumer Privacy Act (CCPA) became effective, requiring new data privacy measures at most US organizations. Yet it is estimated that less than 10 percent are fully prepared for compliance with CCPA. Unfortunately, in this case, ignorance is not bliss and may result in hefty fines.
Read More
video monitors

How Retailers Can Leverage Their Security Infrastructure to Improve Operational Efficiency

Jordan rivchun
Jordan Rivchun
February 25, 2020
Retailers today face a number of security challenges, including shoplifting, shrink and theft at the point of sale, protecting the premises after hours, slip and fall lawsuits and much more. Adding complexity to the security challenge is that retailers face these threats in a variety of locations within stores, each of which comes with its own unique requirements. Today’s flexible, intelligent surveillance cameras offer a variety of form factors and capabilities that allow them to address the range of security and operational challenges.
Read More
SEC0919-Mobile-Feat-slide1_900px

Protecting High-Level Personnel from IMSI Catchers

Mike fong
Mike Fong
February 21, 2020
With such low barriers to entry, it’s no longer just the bad guys who need to be worried about IMSI catchers.
Read More
internet of things

California’s 'Other' Game-Changer: Complying with the New IoT Cybersecurity Law

Reece Hirsch
February 11, 2020
When California Governor Jerry Brown signed Senate Bill 327 on September 28, California became the first state to enact legislation expressly governing cybersecurity measures that must be employed by manufacturers of Internet-connected “smart” devices, collectively known as the Internet of Things (IoT). The law, to be codified at California Civil Code Sections 1798.91.04–06, became effective on January 1, 2020.
Read More
Security Worker

Strategic Decision Support Centers Increase Public Safety and Responsiveness to Community Needs

Giovanni gaccione
Giovanni Gaccione
February 11, 2020
As technologies and laws continue to evolve, and more people move into urban centers, cities are looking for ways to become smarter – and safer. Today, more than half of the world’s population lives in an urban area. It is predicted that by 2030, our planet will have 41 mega-cities with more than 10 million inhabitants each. After all, a successful city attracts businesses, fosters innovation and provides incredible opportunities for its citizens. But how do we construct and manage cities so that everything, and everyone, flows smoothly today and in the future? How can we ensure that cities are resilient and continue to succeed as they grow?
Read More
boonedam-entrance2

Four Reasons Why Your Active Shooter Plan Should Include Security Entrances

Jc powell
JC Powell
February 11, 2020

The Mass Shooting Tracker reported that in 2019 there were 374 mass shootings in the U.S. Given this reality, it is essential to take all possible steps to protect your employees and visitors from harm. It should be a core requirement of every organization’s security plan to give serious consideration to how they will thwart an active shooter. Putting a security plan in place to guard against on-site violence begins at the perimeter, and security entrances are a strong first line of defense against the threat of an active shooter. 


Read More
cybersecurity

The Top 20 Cybersecurity Conferences to Attend in 2020

Maria Henriquez
February 6, 2020

Taking place across the U.S. and the world, cybersecurity conferences can offer unique opportunities for cybersecurity professionals, such as hands-on workshops, networking and certifications. They also provide cybersecurity leaders with greater security awareness of threats, tactics and best practices needed to effectively thwart attacks on the systems and assets they protect. Here, Security brings you a list of the top 20 cybersecurity conferences in the U.S. in 2020.


Read More
SEC1119-awareness-Feat-slide1_900px

Cybercrime Breaches Cost Corporate Boards Big Time: Have You Done Your Due Diligence?

John sileo
John Sileo
February 6, 2020

Back away from the snooze button. This is a $29 million wake-up call you can’t afford to miss. In January 2019, Yahoo’s board agreed to pay the enormous $29 million settlement to its shareholders as the result of cyberattacks that compromised three billion Yahoo user accounts. It was the first time shareholders had successfully held a company responsible for data breaches. And it is a loud warning to corporate boards that they must start paying attention to cyber risks. But are they? 


Read More
Previous 1 2 … 158 159 160 161 162 163 164 165 166 … 213 214 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

2023 Top cyber security leaders

Security's 2023 Top Cybersecurity Leaders

city intersection

California city implements license plate recognition technology

security worker walking up stairs

Protecting lone security workers

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

laptop phone.jpg

31% of organizations had users fall for phishing attack

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing