This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

SOC

Reducing the Chaos: How to Create a Security Operations Center that Helps

Photoheadshot rmi brval formal lrg print
Rémi Bréval
September 24, 2019

In March 2017, drivers on a Montreal highway were stuck for more than 12 hours in 15 inches of snow. Because of a lack of coordination and an inability to share information between first responders, various highway authority groups, and the city, more than 300 motorists were stranded in their cars overnight. 


Read More
cyber professional

Combining Human Expertise and Automation to Close the Cyber Skills Gap

Mike armistead
Mike Armistead
September 23, 2019

The cybersecurity skills shortage has gained a lot of attention in recent years, and for good reason. 


Read More
digital-cyber

Preparing For Physical and Cybersecurity Convergence

Today’s security professionals need comprehensive strategies that take both physical security and cybersecurity into account.
John Dames
September 20, 2019

In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams.


Read More
cloud-enews

Capital One: What’s in Your Cloud?

Chris Morales
September 19, 2019

The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.


Read More
cyber-person

The Financial Sector Can Lead the Charge in Deception Security

Doron kolton
Doron Kolton
September 18, 2019

This summer, more than one million Capital One clients had their information breached, furthering the financial sector’s infamous reputation of being the most breached industry with 35 percent of all data breaches. 


Read More
cyberinsurance

The Proactive Approach to Identifying Cybercriminals

Amyn gilani
Amyn Gilani
September 17, 2019

More than 10 years ago, I was deployed to Iraq as a U.S. Air Force intelligence analyst, assigned to the Joint Special Operations Command (JSOC) Task Force with one clear objective: disrupt terrorist activities by targeting and capturing al-Qaeda insurgents.


Read More
artificial intelligence

Four Ways Artificial Intelligence Helps Mitigate Risk

Clayton brown 1
Clayton Brown
September 10, 2019

In today’s dynamic environments, risk must be proactively managed. However, lack of sufficient intelligence can make it impossible to get ahead of threats and breaches. Fortunately, artificial intelligence (AI) has emerged as a valuable tool in augmenting physical security with a more proactive approach.


Read More
video cameras

Modular Cameras Provide Flexibility, Ease of Installation and Cost Savings

Aaron saks
Aaron Saks
September 10, 2019

When budgeting for video surveillance cameras, there are multiple factors to consider that affect cost beyond the camera itself. It’s important to also know the cost of installation, and the cost to service or upgrade a unit in the future. While configuring a small number of cameras will likely have little impact on cost, the labor involved in installing and servicing hundreds of cameras can be significant. A modular approach to camera design is necessary to reduce the installation costs and long-term maintenance of such cameras.


Read More
rideshare safety

Rideshare Safety 101

Matthew bradley
Matthew Bradley
September 10, 2019

Travel is constantly evolving and there always seem to be new, easier and efficient ways to conduct business while on-the-go. However, as the industry evolves, it’s important for travelers and businesses to stay up-to-date on new services and best practices to efficiently communicate with employees and ensure overall safety. 


Read More
artificial intelligence

What’s the Real Role of AI and ML in Cybersecurity?

Jordan mauriello
Jordan Mauriello
September 5, 2019

Artificial intelligence (AI) and machine learning (ML) are being heralded as a way to solve a wide range of problems in different industries and applications, such as reducing street traffic, improving online shopping, making life easier with voice-activated digital assistants, and more.


Read More
Previous 1 2 … 167 168 169 170 171 172 173 174 175 … 213 214 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

2023 Top cyber security leaders

Security's 2023 Top Cybersecurity Leaders

security worker walking up stairs

Protecting lone security workers

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

laptop phone.jpg

31% of organizations had users fall for phishing attack

Empty conference room

Cyber risk is a business risk

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing