Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Newswire

Security Newswire
Security Newswire RSS Feed RSS

Digital Currency Exploitation in the Spotlight

Kylie Bull
March 1, 2017

The threats posed by transnational criminal networks exploiting digital currencies for money laundering and terrorism financing are high on INTERPOL’s agenda in 2017.


Read More

Return Experts to Be Deployed at EU Borders

Kylie Bull
March 1, 2017

Frontex, the European Border and Coast Guard Agency, has launched a pool of experts who will support the return of migrants across the EU.


Read More

Australia Plans Biometrics Overhaul

Kylie Bull
March 1, 2017

Australia has launched a project that it hopes by 2020 will see 90 percent of air and sea travelers pass through passport control without the need for human passport control staff.


Read More

Addressing Violent Extremism in Prisons

Kylie Bull
March 1, 2017

Highlighting the challenges brought on by and the need to address violent extremism and radicalization in prisons, the United Nations has unveiled a new manual that offers practical advice on managing violent extremist prisoners, disengaging them from violence and facilitating their social reintegration upon release.


Read More
Radiation Exposure Guidelines to Be Created

Radiation Exposure Guidelines to Be Created

Kylie Bull
March 1, 2017

Combatting drug trafficking at ports, screening passengers at airports, determining the age of immigrants who have lost their passports: these are among the areas where radiation is used for human imaging for non-medical purposes.


Read More

21st Century Security: How Los Angeles Schools Benefit from Community-Oriented Policing

February 28, 2017

LAUSD police officers are employing a 21st century policing strategy, with a focus on community oriented enforcement, to improving police-community relations, keep kids in school and to improve the safety of the schools within the district and the surrounding neighborhoods. Learn more about this program and how you could apply it in your own district in a free webinar 3/28. 


Read More
cyber6-900px.jpg

Most Hackers Can Steal Data Within 24 Hours

February 28, 2017

More than three-quarters (88%) of hackers can break through cybersecurity defenses and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days.


Read More

Apparel Industry the Most Vulnerable Sector for Fraud Attacks

February 28, 2017

Forter, a fraud prevention company, said that online fraud attacks grew 8.9% in 2016 and early 2017 compared to 2015, a reduction from the 2015 increase when significant fraud moved from point of sale (POS) to online.


Read More

Citizen Satisfaction with Federal Government Rebounds to Four-Year High

February 28, 2017

Citizen satisfaction with the federal government reached a four-year high at the end of 2016, according to the American Customer Satisfaction Index (ACSI).


Read More
cyber6-900px.jpg

Cyber Tops List of Threats to Business Continuity

February 27, 2017

Cyber attack is once again the top threat perceived by businesses, according to research by the Business Continuity Institute. 


Read More
Previous 1 2 … 786 787 788 789 790 791 792 793 794 … 1134 1135 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing