Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

SEC0919-Mobile-Feat-slide1_900px

Protecting High-Level Personnel from IMSI Catchers

Mike Fong updated
Mike Fong
February 21, 2020
With such low barriers to entry, it’s no longer just the bad guys who need to be worried about IMSI catchers.
Read More
internet of things

California’s 'Other' Game-Changer: Complying with the New IoT Cybersecurity Law

Reece Hirsch
February 11, 2020
When California Governor Jerry Brown signed Senate Bill 327 on September 28, California became the first state to enact legislation expressly governing cybersecurity measures that must be employed by manufacturers of Internet-connected “smart” devices, collectively known as the Internet of Things (IoT). The law, to be codified at California Civil Code Sections 1798.91.04–06, became effective on January 1, 2020.
Read More
Security Worker

Strategic Decision Support Centers Increase Public Safety and Responsiveness to Community Needs

Giovanni Gaccione
Giovanni Gaccione
February 11, 2020
As technologies and laws continue to evolve, and more people move into urban centers, cities are looking for ways to become smarter – and safer. Today, more than half of the world’s population lives in an urban area. It is predicted that by 2030, our planet will have 41 mega-cities with more than 10 million inhabitants each. After all, a successful city attracts businesses, fosters innovation and provides incredible opportunities for its citizens. But how do we construct and manage cities so that everything, and everyone, flows smoothly today and in the future? How can we ensure that cities are resilient and continue to succeed as they grow?
Read More
boonedam-entrance2

Four Reasons Why Your Active Shooter Plan Should Include Security Entrances

JC Powell
JC Powell
February 11, 2020

The Mass Shooting Tracker reported that in 2019 there were 374 mass shootings in the U.S. Given this reality, it is essential to take all possible steps to protect your employees and visitors from harm. It should be a core requirement of every organization’s security plan to give serious consideration to how they will thwart an active shooter. Putting a security plan in place to guard against on-site violence begins at the perimeter, and security entrances are a strong first line of defense against the threat of an active shooter. 


Read More
cybersecurity

The Top 20 Cybersecurity Conferences to Attend in 2020

Maria Henriquez
February 6, 2020

Taking place across the U.S. and the world, cybersecurity conferences can offer unique opportunities for cybersecurity professionals, such as hands-on workshops, networking and certifications. They also provide cybersecurity leaders with greater security awareness of threats, tactics and best practices needed to effectively thwart attacks on the systems and assets they protect. Here, Security brings you a list of the top 20 cybersecurity conferences in the U.S. in 2020.


Read More
SEC1119-awareness-Feat-slide1_900px

Cybercrime Breaches Cost Corporate Boards Big Time: Have You Done Your Due Diligence?

john sileo
John Sileo
February 6, 2020

Back away from the snooze button. This is a $29 million wake-up call you can’t afford to miss. In January 2019, Yahoo’s board agreed to pay the enormous $29 million settlement to its shareholders as the result of cyberattacks that compromised three billion Yahoo user accounts. It was the first time shareholders had successfully held a company responsible for data breaches. And it is a loud warning to corporate boards that they must start paying attention to cyber risks. But are they? 


Read More
Encryption Future - Security Magazine

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

darren anstee
Darren Anstee
February 6, 2020
There seems to be a consensus for advocates of private Internet use that encryption is a good thing, and that encryption of DNS is needed to prevent network operators from gaining visibility into the sites and services their users lookup (and then visit). Two protocols have been created to achieve this encryption: DNS over TLS (DoT) and DNS over HTTPS (DoH). While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:
Read More
virus

Coronavirus: Are We Overreacting?

danny kaine
Danny Kaine
January 31, 2020
Let’s put this into perspective. In 2019, the Centre for Disease Control reports that 61,200 people died from the common flu virus. That’s 168 deaths per day! Compared to Coronavirus that was first reported on December 31st with 213 deaths in total until January 31st. Based on last years statistics, 5,208 people have died of the common flu in that same time period.
Read More
dataminr-connected tissue

Predictions: Safety and Security Trends for 2020 and Beyond

Todd Piett
Todd Piett
January 31, 2020
Driven by the increase in work place and school violence, the omni-present threat of terrorism and the large number of natural disasters, the last decade saw vast improvements in emergency communication and safety technology.
Read More
SEC0519-Review-Feat-slide1_900px

How Human-Layered Security Can Reduce Email-Driven Data Breaches

tony pepper
Tony Pepper
January 29, 2020
The majority of real-life breaches are actually caused by insiders—everyday employees within the organization.
Read More
Previous 1 2 … 224 225 226 227 228 229 230 231 232 … 278 279 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing