Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

data center

IT Reliability and Security in Investment Firms

Managed Service Providers (MSPs) serve the need; here's what to expect from them
MatthewHilsenrad
Matthew Hilsenrad
May 22, 2019

Investment firms are among the most security-conscious businesses, for good reason. In a day – or even an hour – of downtime is a disaster.


Read More
home security

The Problem with Traditional Locks and Managing Remote Access to Rental Properties

And How to Achieve Trusted Access Instead
Danial Ehyaie
Danial Ehyaie
May 20, 2019

If you are a landlord who owns rental property in a different state (or a significant distance away) and you are relying upon traditional locks to manage access to your property, this article will show you a better, more secure, time-saving and money-saving property security system.


Read More
police

The New First Responders— Fighting Back against Active Shooters

Neal Duckworth
Neal Duckworth
May 16, 2019

The FBI recently released its data on the Active Shooter Incidents in the US for 2018. Although there was a slight drop in active shooter events to 27 from the high of 30 in 2017, this is still no cause for celebration.


Read More
circuit- enews

Demand Surge Protection

Anthony Knighton
Anthony Knighton
May 14, 2019
When is the last time your facility was subjected to an electrical power surge? Chances are, you have no idea – for two very good reasons. First, power surges are typically very brief – lasting only a few milliseconds. Secondly, most power surges are relatively small and go unnoticed, unless they are significant enough to make the lights flicker. Even so, they remain dangerous to your systems and should not be ignored – they are a silent killer of your critical electronic equipment.
Read More
mobile-enews

10-Year Lookback at Technology's Role in Shaping Today's Security Professionals

Tim Willis
Tim Willis
May 14, 2019
Think back to 2009 and the phone you owned. While the phone you carry today might not look that different, a smartphone or its equivalent is far more powerful than it was just 10 years ago. While it is relatively easy for businesses to track the evolution of phone technology, have they similarly considered how their own corporate security departments have changed during the same period?
Read More
key-enews

The Insider Threat: Protecting Your Company from Itself

Joe Granitto
Joe Granitto
May 14, 2019
Imagine losing your car keys. It would be inconvenient, as you could be stranded for a while and you would need to find and obtain a replacement key. Now imagine losing a set of work keys. How much disruption could this cause your company? Remember the 2014 Sony breach? It was perpetrated by a group who claimed that they were able to access the movie studio's computer systems because Sony failed to lock their physical doors.
Read More
integration

Physical and Cyber Convergence—At Last?

Bud Broomhead
May 8, 2019

We have been hearing about the “convergence” of physical and cyber security for years, but even today there are still debates about whether it has happened yet (spoiler alert: it hasn’t). Part of the challenge might be that the word convergence itself can apply to more than one kind of activity – for example, some believe it applies to the linkages or integration of IT and security systems, while others believe it applies to IT and security organizational structures and teams.


Read More
vishing

Social Engineering Simulation Testing Tips

Joe Malec
Joe Malec
May 8, 2019
Do you know who is calling you? In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practice where verbal communication is used to deceive a potential victim.
Read More
cyber network

Tipping the Scale for Effective Cybersecurity

Dustin-Hillard
Dustin Hillard
May 8, 2019
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.
Read More

Three Key Learnings for CEOs from Last Month's ASUS Hack

Chris Hickman
April 30, 2019
Last month’s ASUS APT attack doesn’t come as a surprise to any security-conscious industry watcher – this highlights a long-standing flaw in many software supply chains today. Attackers have been engaged in spoofing websites, stealing credentials and gaining unauthorized access for years. Injecting malicious code into legitimate tools that are designed to protect represents the next evolution in putting companies and their customers at risk.
Read More
Previous 1 2 … 240 241 242 243 244 245 246 247 248 … 278 279 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing