Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

video camera on brick wall

Video cameras can use edge AI to create a safer environment

Avi Baum
September 15, 2023

With the rise of smarter camera systems comes a need to monitor video streams more quickly, while making streaming and storage more efficient.


Read More
people working in office

Four strategies for reducing security company risks

John McConnell
September 15, 2023

Keeping a business secure is a complex task and security personnel, by the very nature of their work, often are placed in precarious situations.


Read More
person working at computer

Alert fatigue pushes security analysts to the limit

Eddie Everett
September 15, 2023

Alert fatigue is a significant challenge for security officials in governments and organizations worldwide as it can lead to employee burnout.


Read More
ChatGPT on computer

Generative AI in the enterprise: 4 steps to prepare organizations

Mladen Milanovic
September 13, 2023

As organizations address data privacy & security issues on the expertise needed to use genAI, IT professionals can take steps to prepare for future implementations.


Read More
cyber attack

AI: Fraudster’s greatest weapon and a company’s greatest defense

David Divitt
September 11, 2023

Many workers have a watchful eye for attempted scams. But what if they receive a phone or video call from someone who looks, and sounds, exactly like their boss?


Read More
warehouse photograph

The connection between cybersecurity and worker safety

René Waslo Jason Hunt
September 8, 2023

The bottom line for security leaders is that cyber-resilient organizations often reap greater benefits, including safer work environments.


Read More
person playing chess in suit

Tone at the top: It’s time to bring security to the board level

Lee Waskevich
September 8, 2023

To many boards, cybersecurity can get lost in the shuffle or lose prioritization amidst a packed docket of other high-level priorities. 


Read More
yes we're open sign on door

SMB security essentials: Layer up security defense

Johannes Wiklund
September 8, 2023

Small and medium businesses need to examine the maturity of each layer of defense, and then reinforce these controls to defend their company.


Read More
person paying online with credit card

Authenticating like the transportation security administration

Paul Trulove
September 6, 2023

Identity authentication used by the Transportation Security Administration and financial institutions can be implemented in other areas of security.


Read More
Infrastructure

When humans are the weak link in critical infrastructure cybersecurity

Irfan Shakeel
September 6, 2023

In the growing digital world, cybersecurity has become more important than ever. The human element can often be a challenging, constant problem.


Read More
Previous 1 2 … 44 45 46 47 48 49 50 51 52 … 275 276 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing