Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

leadership-enews2

How to Avoid Intelligence Program Pitfalls

Daniil Davydoff
Daniil Davydoff
January 4, 2019

The surge in demand for intelligence programs and intelligence-oriented global security operations centers (GSOCs) and virtual security operations centers (VSOCs) has not emerged out of thin air. In fact, it has been driven by changing corporate security concerns, which themselves have been shaped by the fears of corporate leaders.


Read More
Aloft Hotel, Dubai exterior

New Aloft Dubai Hotel Implements Advanced Surveillance System for Guest Protection

December 19, 2018

When the prestigious Aloft Dubai South in the United Arab Emirates opened on October 15, 2018, guests, visitors and staff at the new hotel were already protected by an advanced video surveillance system with Arecont Vision Costar megapixel cameras.


Read More
storm-enews

Five Emerging Business Continuity Challenges For 2019

Ann Pickren
December 18, 2018

Enterprise decision makers know to “expect the unexpected” when it comes to business continuity planning. But the increasingly complex threat environment is challenging organizations as never before to prepare for an expanding range of incidents.


Read More
cyber-person

Is Your Data Breach Response Plan Ready?

November 19, 2018

Fifty-six percent of organizations experienced a data breach involving more than 1,000 records over the past two years, and of those, 37 percent occurred two to three times and 39 percent were global in scope, according to Experian. 


Read More
cyber6-900px.jpg

The Cybersecurity Imperative: Key Benchmarks and Takeaways for Security Companies

Kara Klein
November 14, 2018

As the Internet of Things (IoT) grows and cyberthreats become more sophisticated and prevalent, it’s more important than ever for security companies to understand the cybersecurity landscape and have strong cybersecurity postures. The security industry is recognizing the urgency of this issue, too – in the Security Industry Association’s (SIA’s) research to forecast the 2019 Security Megatrends, cybersecurity was identified as the standout trend shaping the security industry.


Read More
handshake-enews

Bridging the CISO-CSO Communications Gap

Threats have converged, even though the defenses against them still operate separately.
Ed Bacco
Ed Bacco
November 12, 2018
There was a time when the corporate security team was responsible for setting the policies for overall security within an organization including digital. Today, those responsibilities are likely to be separated between a Chief Security Officer (CSO) and a Chief Information Security Officer (CISO). This brings into play the views, opinions, needs and requirements of both the CSO and the CISO and the potential conflict that may ensue.
Read More
travel-enews

How to Keep Travel Security Education Relevant & Engaging for Employees

Matthew Bradley
Matthew Bradley
November 12, 2018
We are all just a step away from being affected by a potential medical or security incident, whether in the workplace, while traveling on business or simply going about everyday life. The importance of new employee education, new traveler education or a refresher course on travel risk preparedness cannot be understated.
Read More
Church

A 5-Step Plan for House of Worship Security

November 5, 2018

While places of worship have certainly been sites of active assailant incidents, they pose a unique conundrum to security advocates and congregations – how do you secure your place of worship while maintaining a welcoming atmosphere for congregants, visitors and those in need?


Read More
remote-enews

5 Components to a Proactive Security Strategy

Sachin Sharma
November 1, 2018
Innovations in cloud and mobile technologies have created more opportunities than ever for employees to work remotely, using devices of their choosing. But the flexibility of technology heterogeneity in the workplace isn’t without risk. As data becomes more accessible across a growing range of devices, the attack surface area also grows wider, raising the possibility of a potential data breach.
Read More
blockchain-enews

Is Blockchain a Breakthrough Cybersecurity Solution?

duncan greatwood
Duncan Greatwood
November 1, 2018
From building management to industrial operations to the energy industry, the security of machines and hard assets is converging with cybersecurity.
Read More
Previous 1 2 … 244 245 246 247 248 249 250 251 252 … 278 279 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing