Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Security Newswire

Security Newswire
Security Newswire RSS Feed RSS

Ritz, Marriott Hotels in Jakarta Bombed

July 17, 2009
The Ritz Carlton and JW Marriott hotels in Jakarta, Indonesia, were bombed this morning, said an AP report. Eight people were injured eight people and 51 were injured, in the
Read More

DHS to Review Homeland Security Advisory System

July 14, 2009
The Department of Homeland Security (DHS) will conduct a 60-day review of the Homeland Security Advisory System (HSAS). DHS Secretary Janet Napolitano announced the formation of a task force to
Read More

Mesa, Ariz., Proposes Security Ordinance that Mandates Security Video in Certain Businesses

July 13, 2009
It doesn’t happen often, but Mesa is now considering new safety and security mandates for high traffic retail businesses. In the past, Florida mandated similar requirements after a spate
Read More

Coincidence? Following FPS Building Security Failures, It Goes for New X-ray Gear

July 13, 2009
After GAO investigators tested physical access controls at 10 FPS-guarded government buildings and managed to smuggle bomb parts into all of them, the security failure was directed mostly at
Read More

Bomb Parts Made It Thru Contract Security at 10 High Security Federal Buildings

July 8, 2009
In the ongoing, year-long investigation, the Government Accountability Office reported today it had been able to pass through contract officer manned detection gear and into 10 high security federal
Read More

Cyber Attacks Cripple Major Websites in South Korea

July 8, 2009
The New York TimesAn army of "zombie computers" infected by a hackers’ program paralyzed major government, bank and newspaper websites in South Korea in cyber attacks that officials here said
Read More

Russian Immigrant Tried to Steal Secret Code: Goldman Sachs Trading Platform the Alleged Target

July 6, 2009
There has been a spate of “theft of trade secrets” charges this summer. CNBC is reported today that a Russian immigrant was just arrested for theft of trade secrets
Read More

Broadview Security? It Was Brink’s Home Security

July 1, 2009
One of the largest security service firms is rebranding. Brink’s Home Security Holdings, Inc. is changing the name of its home and business security offering to Broadview Security. To celebrate
Read More

Airport fast-lane program Clear shuts down

June 23, 2009
by Mark Harden, for the San Francisco Business Times   Clear, a service founded by entrepreneur Steven Brill that said it could get air travelers through security lines more quickly,
Read More

Exclusive Interview: Massachusetts New Privacy Regulation and What to Do

June 22, 2009
The Commonwealth of Massachusetts enacted a regulation last September protecting state citizens’ personal information. Originally scheduled for Jan. 1, 2009, the law will now take effect for all Massachusetts
Read More
Previous 1 2 … 1020 1021 1022 1023 1024 1025 1026 1027 1028 … 1041 1042 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

Popular Stories

SEC Top Cybersecurity Trends of 2023 header

Top cybersecurity trends of 2023

digital fingerprint

Digital fatigue is increasing cyber risks in modern workplaces

ChatGPT on computer

Security leaders discuss ChatGPT DDoS attack

tower of surveillance cameras

The evolution of AI and physical security

QR code on phone

New report shows 51% rise in QR code phishing for September

SEC AuditBoard webinar

Events

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

October 18, 2023

How to Enhance Corporate Investigations for Mac Computer Forensics

ON DEMAND: Apple Mac computer use is growing in the corporate space. Having the solutions and the knowledge base to respond to events that include Mac computers is just as important as their Windows counterparts.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
LinkedIn

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing