Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
Security Enterprise Services RSS Feed RSS

SEC0319-Cyber-Feat-slide1_900px

The Evolution of Artificial Intelligence as a System

derek manky
Derek Manky
January 9, 2020
Artificial Intelligence (AI) rests on the verge of transforming both business and society. Financial firm UBS forecasts that next year, the AI market will be worth $12.5 billion due to huge improvements and broader adoption of the technology. And BCG Henderson Institute found that though most leaders have not yet seen significant impact from their AI initiatives, they firmly expect to within the next five years.
Read More
SEC0120-K9-Feat-slide1_900px

How K-9 Programs are Force Multipliers

How do you know if a K-9 program is right for you, and how do you get started?
Maria Henriquez
January 6, 2020

What are the challenges that the team at the North Greenville University Office of Campus Security faced when implementing its K-9 program?


Read More
SEC0120-Cover-Feat-slide1_900px

Metrics and ROI That Matters in 2020 and Beyond

If enterprise security continues to mature as a business function, in most enterprises, senior management will ask for a set of metrics to measure performance.
January 1, 2020

What is the point of spending time, resources and money on your security program if you can't tell whether it's working or not? It's just as important to establish the right metrics for a security program as it is to have such a program in the first place.


Read More
SEC0120-cyber-Feat-slide1_900px
Cyber Tactics

New Year Prognostications: A Perennial Guide for the Perplexed

John McClurg
John McClurg
January 1, 2020

2020 heralds a few major shifts that will transform cybersecurity: ransomware attacks, artificial intelligence, facial recognition and mobile cybersecurity.


Read More
SEC0120-Career-Feat-slide1_900px
Career Intelligence

Considerations for Your Security Career in 2020

Brennan-2016-200px.jpg
Jerry J. Brennan
January 1, 2020

As we enter the new year, conversations within the security community often inevitably deal with issues and programs that will be of greatest concern to leadership in the coming months.


Read More
SEC0120-Talk-Feat-slide1_900px
Security Talk

Election Infrastructure Remains Vulnerable to Attacks

diane-2016-200.jpg
Diane Ritchey
January 1, 2020

In 10 months, U.S. citizens will elect a new president. As the race heats up and election day nears, a key component of the U.S. election infrastructure remains vulnerable to cyberattacks and misinformation campaigns.


Read More
SEC0719-Privacy-Feat-slide1_900px

Anomaly Detection in SOC – Friend or Foe?

Lots of security vendors talk about integrating innovative techniques using Artificial Intelligence. In cybersecurity, this often boils down to supervised or unsupervised anomaly detection of measures attributes. However, in many cases there is a big gap between the identification of anomalies and transforming them into actionable data.
haim Zlatokrilov
Haim Zlatokrilov
December 27, 2019
There are lots of buzzwords floating around cybersecurity: machine learning, artificial intelligence, supervised and unsupervised learning … In many cases these advanced technologies are based on anomaly detection.
Read More
SEC0819-Edu-Feat-slide1_900px

2020 Cybersecurity Predictions: Four 2019 Trends That Will Solidify in the New Year

Josh Lemos
December 26, 2019
The pace of change in cybersecurity is quickening as technologies like 5G and artificial intelligence enable new services, products and modes of communication.
Read More
videoscreen-enews

Look to the Cloud for Small Business Security

Hosted video surveillance services can be the perfect fit for small businesses.
al-buhaisi
Hamdan Al-Buhaisi
December 23, 2019

If there’s one thing most small business owners have in common, it’s being pressed for time. Managing so many areas of responsibility leaves small businesses with little time to dedicate to any one task. Important decisions – like investments in security – demand time and attention but must also be weighed against what’s realistic for your organization to maintain within its current resource level. Hosted video surveillance services, for example, can provide small businesses with reliable video monitoring but with less maintenance than traditional security deployments, and less upfront cost.  


Read More
cyberinsurance

Just Paid the Ransom? Here’s How to Prevent It From Happening Again

Richard Langston
December 23, 2019
Hackers can be relentless with their cyberattacks. While organizations can be vulnerable to many security threats, ransomware is especially ruthless since its attacks are completely automated. It doesn’t matter what industry or business you are in – hackers don’t care if your organization has “nothing of value,” their machines will try to attack anything that is vulnerable.
Read More
Previous 1 2 … 280 281 282 283 284 285 286 287 288 … 366 367 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing