Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

ransomware

Ransomware Attacks: Strategies to Recover and Prevent Them

schachar shamir
Schachar Shamir
June 27, 2019

Chances are you’ve been warned never to download files or click on links from unknown senders. 


Read More
control room

An Intelligent Platform for Intelligent Security Solutions

brian kelly
Brian Kelly
June 27, 2019

In the monitoring and surveillance sector, Artificial Intelligence based solutions such as Intelligent Video Analytics (IVA), are entering the mainstream as they reach levels of refinement, usability and affordability.


Read More
fairpointe

Smartphone Access Is More Cyber Secure than Card-Based

Scott Lindley
June 26, 2019

For the past several years, there has been a focus by users to assure that their card-based access control systems are secure.


Read More
Fraud Cybersecurity Banking in Canada

Fraud and Data Breaches – Are Consumers Bringing Worries To Work?

curtis peterson
Curtis Peterson
June 26, 2019

We haven’t exactly had a strong past year in the data security and privacy world. 


Read More
mobile phone

Becoming Proactive: Smart Mobile Security Solutions

andre datyelian
Andre Datyelian
June 25, 2019
Smart mobile devices have become almost as necessary as breathing today. A wide range of devices are available – more than ever before, and at ever more affordable price points, fueling their ubiquity. The capabilities of these smart mobile devices are also expanding. They allow us to access more social media platforms than we have friends, provide us quick access to all the information on the web, handle our schedules, and most importantly, they allow us to be proactive with our security.
Read More
concerts

Enhancing Event and Concert Safety with Mass Notifications

PatScheckel
Pat Scheckel
June 25, 2019
Concert venues and other events often draw large crowds. This can cause numerous issues when event organizers and building administrators are trying to communicate safety information. Noise and other distractions can make it difficult to grab people’s attention and relay instructions that will keep them out of harm’s way. Whether it’s an active shooter, bomb threat, severe weather, fire, or some other emergency, you need to have plans in place to share information with attendees and manage the situation at hand.
Read More
workplace violence

Workplace Violence: How to Identify and Mitigate It in Your Enterprise

Robin Baker
Robin Baker
June 25, 2019
The Capitol Gazette in Annapolis, MD, the Inland Regional Center in San Bernardino, CA, and just recently, a disgruntled worker in Virginia Beach, VA who took his personal grievances out on his workers at a government office, killing 12 people. All recent examples of workplace violence that are becoming all too frequent. According to a recent study by the Society for Human Resource Management (SHRM), approximately 1 out of 7 Americans do not feel safe at work.
Read More
Is Your Vendor Risk Management Program Working? - Security Magazine

Quantifying Risk & Security Funding: How Everyone Can Get What They Want

jason rowland
Jason Rowland
June 25, 2019

Risk quantification has long been an imperative topic for security leadership, but now more than ever, boards of directors and C-Suite executives are acutely invested in how their organizations are performing from a security risk perspective.


Read More
grant lecky

Grant Lecky Receives Bill Zalud Memorial Award for Professional Excellence

Maria Henriquez
June 24, 2019

In 2017, The International Foundation for Protection Officers, in conjunction with Security Magazine, announced the inaugural Bill Zalud Memorial Award for Professional Excellence, an award that recognizes one security professional or an organization for professional excellence or outstanding service in the security profession.


Read More
surveillance

Top Trends in Addressing Operational Challenges Through Technology in Physical Security

TimLozier
Tim Lozier
June 21, 2019

In the Security Guard industry, there is a tremendous level of complexity and market factors that are creating various challenges to reduce costs, improve profitability and operate in the most efficient manner possible.


Read More
Previous 1 2 … 233 234 235 236 237 238 239 240 241 … 274 275 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing