Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

Why Ethical Hacking is the New Face of Cyber Security

Andrew Whitaker
July 9, 2013
The job interview was going well when the young man made a confession: his printer was broken.
Read More

How Low Retention Costs Enterprises

Paul Hughes
July 9, 2013
In at least one way the security industry mirrors the fast food business – the employee turnover rate is nearly 400 percent annually in both lines of work.
Read More

Why Two-Factor Authentication is a Statistical Necessity

Greg Sarrail
June 25, 2013
To minimize risk, two-factor authentication has become a necessity and is now generally being adopted. Two-factor authentication is the combination of two out of the three possible methods (something you know, something you have, something you are).
Read More

How Cloud-Hosted Video Can Benefit the SME and Enterprise Businesses

Jay Krone
June 25, 2013
Storage has never been more important to businesses of all sizes and shapes than it is today.
Read More

19th Century Courthouse Goes Digital with Cloud-Based Access Control

June 20, 2013

The Old Lake County Courthouse (or "The Grand Old Lady") was erected in 1878, but recent renovations led to the space's use as retail and offices, as well as a functioning courtroom, all operating with standard locks and keys. This is where the problems began.


Read More

Surveillance, Evacuation Solutions Enhance Milan's New Driverless Metro

Italy's longest metro system now combines video surveillance and public-address communication to manage evacuation measures.
June 17, 2013

Italy's longest metro system now combines video surveillance and public-address communication to manage evacuation measures.


Read More

How to Sort through Big Data for Threat Detection

Vince Walden
June 11, 2013
In the age of Big Data where volume, velocity and variety of data is increasing complexity both internally and externally, integrating new data sources is bringing organizations tremendous opportunities to mitigate threats in new, innovative ways.
Read More

How GTRI Practices Could Protect Schools from Violence

Bernard Scaglione
June 11, 2013
As all security experts know, one of the basic principles utilized in securing buildings or institutions is controlling access onto the property and into building by using basic security measures such as security officers, fencing, bars on windows or electronic access control systems.
Read More

How Business Intelligence Becomes an Eco-Research Tool

Scientists in Australia's Rainforests and California's Beaches Use Business Analysis to Collect Data and Save the Ecosystem
June 3, 2013

As environmental regulations increase, industrialization’s effects stretch further and ecological scientists grasp for new ways to collect vital data, some parties are all reaching for the same thing: business intelligence. 


Read More

Why Global Supply Chains Need Global Shared Security Standards

Peter Kant
May 28, 2013
The attempted bombing of two cargo aircraft in October 2010 via hidden explosives inside printer cartridges illuminated one thing to the air cargo industry – it is not immune to terrorism.
Read More
Previous 1 2 … 253 254 255 256 257 258 259 260 261 … 277 278 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing