Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

perimeter security

Mitigating risk with perimeter protection

John Feeney
John Feeney
April 13, 2021
Keeping unauthorized intruders from entering a business location is a critical part of protecting corporate assets. Perimeters are the first line of defense but do not conform to a ‘one-size-fits-all’ safeguarding solution. Selection criteria for the most suitable Perimeter Intrusion Detection System (PIDS) must take into consideration perimeter length, topography, environmental conditions, and future site expansion plans.
Read More
boon edam

Touchless access control solutions look to alter the landscape of higher education

New and innovative access control and secured entrance options take center stage on college campuses
JC Powell
JC Powell
April 13, 2021
The reality is that most institutions of higher learning have decided to open their campuses this fall regardless of the political rancor, adding the specter of a deadly pandemic to an already challenging campus security environment where campus shootings, physical violence to women and theft usually occupy the top threat metrics for college security administrators. Because college and university campuses have thousands of students and faculty traversing a wide swath of buildings all day, every day, having an access control solution that not only addresses the security aspect of this population, but now one that must also handle myriad safety and health concerns due to COVID-19 to lessen the likelihood of the virus spreading, is a top priority.
Read More
cyber security freepik

Timing isn't everything but it helps

Tamir Hardof
April 12, 2021
Many lessons were learned in enterprise IT and security teams in 2020, right down to the final weeks of the year with the SolarWinds attack. We closed out a miserable year with a devastating reminder about the danger of third party access and supply chain attacks.
Read More
remote work

Staying healthy & virus free digitally

Tom Kelly
Tom Kelly
April 9, 2021
In the United States, February is often considered the last peak month of flu season. We are all accustomed to the unpleasant coughing fits and runny noses that accompany winter’s chill. However, in a turn of events, the common flu has been relatively uncommon across the country this winter. Instead, we continue to deal with the fallout from the far more contagious—and far less forgiving—SARS-CoV-2 virus. 
Read More
5 minutes with Leasher

5 minutes with Jeremy Leasher - Training the cybersecurity workforce

Maria Henriquez
April 8, 2021

Meet Jeremy Leasher, Security Solutions Architect at Axellio. Leasher believes the IT security industry is undergoing a serious skills crisis, threatening to undermine the security of commercial and government organizations. Here, we talk to Leasher about the best approach to solving this skills crisis.


Read More
cyber freepik

Taking a DIY approach to cybersecurity is a dangerous proposition

Working with an MDR provider gives you the talent, tools and full coverage you need
Dave Martin
April 8, 2021
Cybersecurity is not a one-and-done proposition. Deterring cybersecurity threats and remediating incidents is a complex and never-ending responsibility. Malicious state actors, cybercriminals and corporate espionage are just a few sources of cyberattacks. Each one uses dozens of ever-evolving techniques to overcome security safeguards. 
Read More
cyber security freepik

How women can break the cybersecurity glass ceiling - And why we need to help them

Ashley Rose
April 7, 2021
A 2019 S&P Global study found that public companies with women at the helm were more profitable compared to those with men in the CEO and CFO seats. Women are also making big inroads in other fields including science and medicine. Yet in the tech and cybersecurity industries women still lag behind. It’s certainly not because of a lack of jobs. Though the talent shortage did ease last year, the industry as a whole is struggling to fill vacancies. There are a few reasons that women aren’t filling those seats.
Read More
camera surveillance

The new rules of security: How AI will transform video surveillance

Steve Lindsey Brandon Woolf
April 6, 2021

When it comes to intelligent video surveillance in particular, AI-driven products are beginning to unlock new functionality, and even change the role video surveillance plays for companies. From better sensors to higher resolution cameras to more efficient processing units, we're seeing an unparalleled convergence of hardware and software. And that's creating new opportunities for everything from intelligent threat detection to personalized customer experiences. We're just at the beginning of this journey, but it's clear that best practices are changing. Seemingly in real-time, security professionals are reimagining how they'll build their teams, structure engagements and define their value. We're all still building the playbook as we use it, but here are four new, unspoken "rules" for the new world of security - and how they'll continue to evolve thanks to AI.


Read More
data privacy freepik

What’s the failsafe alternative to FireEye and SolarWinds?

Elliot Lewis
April 6, 2021

Those on the cyber threat frontlines may view the entire FireEye-SolarWinds catastrophe through a very different lens. It’s a mile-high view that proves a thesis: why data must be smart and able to protect itself from cybercriminals – no matter where it goes, where it’s stored or who has it.


Read More
remote work/hybrid freepik

Security implications of a hybrid workplace

Jim Bowers
Jim Bowers
April 5, 2021
There’s a consensus building that for many of us, our post-pandemic reality will be a hybrid workplace—one in which a mix of in-person, WFH and offsite employees is a daily occurrence. This means it will be up to IT security pros to fill the gaps and stop intruders.
Read More
Previous 1 2 … 161 162 163 164 165 166 167 168 169 … 272 273 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing