This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

DualAuthentication2

Why Two-Factor Authentication is a Statistical Necessity

Greg Sarrail
June 25, 2013
To minimize risk, two-factor authentication has become a necessity and is now generally being adopted. Two-factor authentication is the combination of two out of the three possible methods (something you know, something you have, something you are).
Read More
CloudVideo

How Cloud-Hosted Video Can Benefit the SME and Enterprise Businesses

Jay Krone
June 25, 2013
Storage has never been more important to businesses of all sizes and shapes than it is today.
Read More
courthouse feat

19th Century Courthouse Goes Digital with Cloud-Based Access Control

June 20, 2013

The Old Lake County Courthouse (or "The Grand Old Lady") was erected in 1878, but recent renovations led to the space's use as retail and offices, as well as a functioning courtroom, all operating with standard locks and keys. This is where the problems began.


Read More
The new driverless train in Milan's metro line 5 is supported by surveillance cameras and integrated mass notification for stronger evacuation protocols and security.

Surveillance, Evacuation Solutions Enhance Milan's New Driverless Metro

Italy's longest metro system now combines video surveillance and public-address communication to manage evacuation measures.
June 17, 2013

Italy's longest metro system now combines video surveillance and public-address communication to manage evacuation measures.


Read More
stormy

How to Sort through Big Data for Threat Detection

Vince Walden
June 11, 2013
In the age of Big Data where volume, velocity and variety of data is increasing complexity both internally and externally, integrating new data sources is bringing organizations tremendous opportunities to mitigate threats in new, innovative ways.
Read More
schoolbus

How GTRI Practices Could Protect Schools from Violence

Bernard Scaglione
June 11, 2013
As all security experts know, one of the basic principles utilized in securing buildings or institutions is controlling access onto the property and into building by using basic security measures such as security officers, fencing, bars on windows or electronic access control systems.
Read More
Business intelligence gathering is revolutionizing rainforest research.

How Business Intelligence Becomes an Eco-Research Tool

Scientists in Australia's Rainforests and California's Beaches Use Business Analysis to Collect Data and Save the Ecosystem
June 3, 2013

As environmental regulations increase, industrialization’s effects stretch further and ecological scientists grasp for new ways to collect vital data, some parties are all reaching for the same thing: business intelligence. 


Read More
rapiscan_feat

Why Global Supply Chains Need Global Shared Security Standards

Peter Kant
May 28, 2013
The attempted bombing of two cargo aircraft in October 2010 via hidden explosives inside printer cartridges illuminated one thing to the air cargo industry – it is not immune to terrorism.
Read More
badging_feat

How Outsourcing Can Increase Badging Efficiency and Reduce Cost

David Finkelstein
May 28, 2013
Security officers often deal with photo ID card issuance as an afterthought, but companies should take advantage of the fact that these cards are the most visible daily reminder of security policy.
Read More
mail_enews

4 Steps to Better Mail Screening and Ricin Detection

James Viscardi
May 28, 2013
Recent incidents of ricin being mailed to the White House and members of Congress are a chilling reminder that the mail system continues to be used by those wishing to do harm.
Read More
Previous 1 2 … 185 186 187 188 189 190 191 192 193 … 209 210 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security camera
    Sponsored byAxis

    The power of analytics in surveillance: What can they do for you?

  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

Top security conferences of 2023

Top security conferences of 2023

ransomware

Ransomware attacks decreased 61% in 2022

Campus security officer

Considerations for security officer training in healthcare facilities

hospital room

3 healthcare data vulnerabilities to be mindful of in 2023

security compliance

5 trust-building tips from a risk-minded CISO

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

February 16, 2023

Executive Protection for Hospitals and Healthcare Facilities

A head of state needs heart surgery at your facility. High-profile members of a national sports team are getting updated vaccinations. What do you do when you get the call?

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing