Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

cloud-enews

How to Make Informed Risk Management Decisions about What to Store in the Cloud

Mark. B. Cooper
November 1, 2018
Are we asking enough questions about cloud security for organizations to make informed risk management decisions? With cyber threats evolving, cloud servers are a major target and more than 80 percent of organizations store their information in the public cloud, according to Rightscale’s 2018 State of the Cloud Report. This begs the question of cloud security.
Read More
police1-900px.jpg

What to Know About Identifying Pipe Bombs

Matthew Bradley
Matthew Bradley
October 26, 2018

Pipe bomb. The words conjure horrific images of an everyday scene punctured by shrapnel from an exploding pipe.


Read More
Washington Community High School, Exterior

Upgrading Surveillance Makes for a Night-and-Day Change at Washington Community High School

October 18, 2018

“We wanted a partner who would look out for us as a district,” says Ron Ehlers, WCHS Network Administrator. “We wanted to invest in a futureproof system that could grow along with us.”


Read More
leadership

Why Senior Management is the Biggest Threat to Workplace Security

Jonathan Dungan
Jonathan Dungan
October 15, 2018

New research undertaken by 247meeting has revealed senior management as being the culprits for some of the biggest lapses in workplace security.


Read More
Citi Field, home of the Mets

Security in the Outfield

At Citi Field in New York City, Technology and Personnel Team Up for Threat Detection
August 30, 2018

As fans begin to trickle into Citi Field in New York City, home of the Mets, a room behind center field is already on full alert, monitoring for potential risks that could affect fans, players, employees and property.


Read More
meeting2-900px.jpg

Threat Assessment: Exercise & Evaluation Best Practices

How to Utilize the Homeland Security Exercise and Evaluation Program (HSEEP) Framework, Part 3
Cody Mulla -2
Cody Mulla
Glen Reed
Glen Reed
August 29, 2018

Increased awareness of the threat assessment function maximizes reporting increasing the information available to the team to mitigate threats.


Read More
infrastructure 1 responsive default security

Manufacturing and The Cloud – Navigating the Evolving Security Landscape

Rob Janssens
August 23, 2018

Despite the ever-evolving sophistication of hackers, security-conscious cloud providers now offer a far safer environment at a lower cost than most individual companies can provide for themselves. 


Read More
meeting1-900px.jpg

Threat Assessment: How to Build Exercises and Evaluate Performance

How to Utilize the Homeland Security Exercise and Evaluation Program (HSEEP) Framework, Part 2
Cody Mulla -2
Cody Mulla
Glen Reed
Glen Reed
August 22, 2018

Threat assessment, much like any other organizational function, needs to be actively managed and continuously improved. The HSEEP framework offers a strategy for both novice and seasoned teams to monitor progress through documented training.


Read More
guards 3 responsive default

How to Promote Continuous Improvement in Threat Assessment Programs

How to Utilize the Homeland Security Exercise and Evaluation Program (HSEEP) Framework
Cody Mulla -2
Cody Mulla
Glen Reed
Glen Reed
August 15, 2018

Although not all events can be stopped, there are strategies to mitigate occurrences by identifying threats at organizations. Threat assessment should be used at the organizational level to identity behavior that could lead to violence.


Read More
McCormick Place Chicago interior

Federated, Integrated Security Reaps Rewards for McCormick Place

August 7, 2018

“Given today’s climate regarding security, we have to be able to optimize our security presence on campus as much as possible,” says Frank Solano, Security Systems Manager for McCormick Place. “That means using technology and other tools to keep our visitors safe."


Read More
Previous 1 2 … 201 202 203 204 205 206 207 208 209 … 234 235 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

Popular Stories

SEC Top Cybersecurity Trends of 2023 header

Top cybersecurity trends of 2023

digital fingerprint

Digital fatigue is increasing cyber risks in modern workplaces

ChatGPT on computer

Security leaders discuss ChatGPT DDoS attack

tower of surveillance cameras

The evolution of AI and physical security

QR code on phone

New report shows 51% rise in QR code phishing for September

SEC AuditBoard webinar

Events

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

October 18, 2023

How to Enhance Corporate Investigations for Mac Computer Forensics

ON DEMAND: Apple Mac computer use is growing in the corporate space. Having the solutions and the knowledge base to respond to events that include Mac computers is just as important as their Windows counterparts.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
LinkedIn

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing