Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

police

The New First Responders— Fighting Back against Active Shooters

Neal Duckworth
Neal Duckworth
May 16, 2019

The FBI recently released its data on the Active Shooter Incidents in the US for 2018. Although there was a slight drop in active shooter events to 27 from the high of 30 in 2017, this is still no cause for celebration.


Read More
circuit- enews

Demand Surge Protection

Anthony Knighton
Anthony Knighton
May 14, 2019
When is the last time your facility was subjected to an electrical power surge? Chances are, you have no idea – for two very good reasons. First, power surges are typically very brief – lasting only a few milliseconds. Secondly, most power surges are relatively small and go unnoticed, unless they are significant enough to make the lights flicker. Even so, they remain dangerous to your systems and should not be ignored – they are a silent killer of your critical electronic equipment.
Read More
mobile-enews

10-Year Lookback at Technology's Role in Shaping Today's Security Professionals

Tim Willis
Tim Willis
May 14, 2019
Think back to 2009 and the phone you owned. While the phone you carry today might not look that different, a smartphone or its equivalent is far more powerful than it was just 10 years ago. While it is relatively easy for businesses to track the evolution of phone technology, have they similarly considered how their own corporate security departments have changed during the same period?
Read More
key-enews

The Insider Threat: Protecting Your Company from Itself

Joe Granitto
Joe Granitto
May 14, 2019
Imagine losing your car keys. It would be inconvenient, as you could be stranded for a while and you would need to find and obtain a replacement key. Now imagine losing a set of work keys. How much disruption could this cause your company? Remember the 2014 Sony breach? It was perpetrated by a group who claimed that they were able to access the movie studio's computer systems because Sony failed to lock their physical doors.
Read More
integration

Physical and Cyber Convergence—At Last?

Bud Broomhead
May 8, 2019

We have been hearing about the “convergence” of physical and cyber security for years, but even today there are still debates about whether it has happened yet (spoiler alert: it hasn’t). Part of the challenge might be that the word convergence itself can apply to more than one kind of activity – for example, some believe it applies to the linkages or integration of IT and security systems, while others believe it applies to IT and security organizational structures and teams.


Read More
vishing

Social Engineering Simulation Testing Tips

Joe Malec
Joe Malec
May 8, 2019
Do you know who is calling you? In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practice where verbal communication is used to deceive a potential victim.
Read More
cyber network

Tipping the Scale for Effective Cybersecurity

Dustin-Hillard
Dustin Hillard
May 8, 2019
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.
Read More

Three Key Learnings for CEOs from Last Month's ASUS Hack

Chris Hickman
April 30, 2019
Last month’s ASUS APT attack doesn’t come as a surprise to any security-conscious industry watcher – this highlights a long-standing flaw in many software supply chains today. Attackers have been engaged in spoofing websites, stealing credentials and gaining unauthorized access for years. Injecting malicious code into legitimate tools that are designed to protect represents the next evolution in putting companies and their customers at risk.
Read More
cyber-attack

The Cybersecurity Talent Gap = an Industry Crisis

DaveBarton
Dave Barton
April 30, 2019
Both the government and the private sector are scrambling for talent. Thousands of information-security jobs are going unfilled as the industry in the U.S. struggles with a shortage of properly trained professionals. By one estimate, there will be 3.5 million unfilled cybersecurity jobs by 2021.
Read More
vendor selection

Many Vendors, Many Decisions: How Safeguarding your Vendor Selection Practices Can Help Reap Rewards for your Security Enterprise

Ken-Lamarca
Ken LaMarca
April 30, 2019
Many enterprises face challenges when choosing the right security partners to implement and maintain their systems. Security management places a premium on their specific physical security strategies, either because of the complexity of their needs, or the specific system demands and compliance regulations associated with their specific business classification. Therefore, the goal should be to partner with suppliers whose focus is to deliver the solutions that best fulfil desired system functionality and operations.
Read More
Previous 1 2 … 238 239 240 241 242 243 244 245 246 … 275 276 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Coding on screen

This Website Exposed ICE Data — Now, It’s Faced a Cyberattack

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing