Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Columns » Security Talk Column

Security Talk Column
Security Talk Column RSS Feed RSS

Studying the 'Wicked Problem' of Cyber Security

Cyber crime has been referred to as a “wicked problem,” and its solution may well lie in stronger education.
November 5, 2013

Frederick Chang recently joined Southern Methodist University to develop a multidisciplinary program to tackle the most pressing cyber challenges facing the world today.

 


Read More

10 Ways to Secure Enterprise Data Over the Holiday Season

As we all soon will head out on upcoming holiday vacations, we all run the danger of becoming a remote risk for our companies, often without being aware of it.
October 1, 2013

As we all soon will head out on upcoming holiday vacations, we all run the danger of becoming a remote risk for our companies, often without being aware of it.


Read More

The Good Old Days of Cyber Security

Advanced Persistent Threats (APTs) are proving traditional cyber attacks (viruses, malware, etc) outdated, according to Larry Clinton, President & CEO of the Internet Security Alliance.
diane-2016-200.jpg
Diane Ritchey
September 1, 2013

 Each minute in 2010 there were 45 new viruses created, 200 new malicious websites established, 180 personal identities stolen, 5,000 new versions of malware created and most importantly, 2 million dollars lost.  


Read More

Leading Security at 1,700 Feet

How does Keith Kambic manage security for the Willis Tower, the tallest building in Chicago?
August 1, 2013

 Next month, Chicago will host the ASIS Seminar and Exhibits, September 24-26, at McCormick Place. When attendees have free time, they might want to visit the Willis Tower (formerly the Sears Tower), which stands tall above the Chicago skyline and is one of the most famous landmarks for the city.  


Read More

Strengthening Passwords with the FIDO Alliance

The average consumer has 35 passwords, but how secure are they?
June 1, 2013

 How many passwords do you have? The average consumer has 35. The problem when you get that number is remembering them, duplicating them or losing them. That’s where the FIDO (Fast IDentity Online) Alliance comes in. 


Read More

Understanding the DIY Security Trend

When know-how information, or knowledge, is scarce, customers overcome it by doing it themselves.
May 9, 2013

When know-how information, or knowledge, is scarce, customers overcome it by doing it themselves.


Read More

How Cyber Security Changes Leadership Skills

Kieran Norton believes that cyber security is undergoing an important change.
May 9, 2013

Kieran Norton believes that cyber security is undergoing an important change.


Read More

Port Authority’s New CSO Aims to Build Interagency Cooperation

diane-2016-200.jpg
Diane Ritchey
April 1, 2013
Last year, Joe Dunne, a 32-year NYPD veteran, was appointed to the newly created position of chief security officer of the Port Authority of New York and New Jersey. Specifically, he’s in charge of all the Port Authority’s security and public safety issues, including its 1,700-man police department. Now six months into his new role, what challenges has he faced in securing one of the most visible ports in the world?
Read More

Building Trust and Confidence through Partnerships

diane-2016-200.jpg
Diane Ritchey
March 1, 2013
Phil Hopkins, Vice President Global Security for Western Union, has a successful background in the public and private sectors. To what does he attribute his success, and what are the qualities that make him successful, including his relationship with his CEO?
Read More

How Ryder Secures the Supply Chain

December 1, 2012
From point A to point B and in between: securing the supply chain is becoming an increasingly high-profile issue among enterprises, and it is growing in complexity. How do we protect our nation’s borders against terrorism and drug threats while still facilitating trade and the free flow of goods?
Read More
Previous 1 2 … 9 10 11 12 13 14 15 16 17 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing