Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Columns

Columns
Columns RSS Feed RSS

How to Keep Up with Emerging Technologies and Risks

consumers hundreds of billions of dollars annually. In the United States, credit card fraud resulting from cyber intrusions has skyrocketed.
Mattice-2016-200px.jpg
Lynn Mattice
April 1, 2014

Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.


Read More

Views from a Top Integrator

Kratos PSS provides rapidly evolving technologies such as digital video analytics, LAN/WAN convergence and wireless solutions.
diane-2016-200.jpg
Diane Ritchey
April 1, 2014

Kratos Public Safety & Security Solutions’ Robert Gaulden discusses the latest trends in security technology and how to manage surveillance for rooftop helipads.


Read More

Using NIST for Easier Cybersecurity Management

Corporate executives can develop enough expertise to comfortably navigate key cybersecurity risk management concepts
April 1, 2014

The National Institute of Standards and Technology’s cybersecurity framework is now available, so how can CSOs and CISOs use it to better frame their cyber efforts and prove their case to the C-Suite?


Read More

Getting Realistic Results from Security Technology

As the security industry heads to the largest technology trade show in the world, ISC West in Las Vegas, it is a great time to do an inventory and reflect on your security technology investments and systems
Mark McCourt
March 1, 2014

There will be more than 1,000 exhibits at ISC West plus another 100 or so new technologies and solutions presented in hotel suites and meeting rooms off the show floor. Robust discussion about the movement toward IP, mobility and the cloud will buzz across the show floor, as it should.


Read More

Changing the Definition of Surveillance in the Age of Converged Risk

Surveillance deals with the act of carefully watching someone or something with the specific intent to prevent or detect a crime.
Bob Liscouski
March 1, 2014

The role of the CSO has significantly changed in the past 10 years and will change even more drastically over the next 10. For example, mention “convergence” and lines begin to blur – lines demarcating previously clear-cut, albeit traditional areas of management responsibility, budgets, reporting hierarchies, resourcing needs and geography.


Read More

Working with Canines in Healthcare

No one is quite sure when humans first domesticated dogs, however, dogs and people have been working side by side for thousands of years.
diane-2016-200.jpg
Diane Ritchey
March 1, 2014

Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.


Read More

Checklist: 24 Steps for Data Security While Traveling Abroad

When traveling overseas, there is already plenty of work to do in terms of planning, packing and then actually traveling.
Edward Yakabovicz
March 1, 2014

When we travel, the data we carry and our Internet habits can put our individual privacy and data security at risk.


Read More

The Top Steps to Handling An Executive Kidnapping

The most important step is to understand the level and type of kidnap risk in countries or regions where your organization operates or where employees are expected to travel for business reasons.
Aaron Sanchez
March 1, 2014

If your organization is operating in an area where the risk of kidnap is deemed high, you should consider the Special Risk options available through the insurance market. Carried by many leading underwriters, Kidnap/Ransom and Extortion (KRE) coverage reimburses the losses associated with a kidnap.


Read More

Joining the Security Enterprise Mainstream

Security executives are placing more importance on the intangible value-adds that an integrator brings versus just looking for the low-bid provider.
Kyle Hildebrand
March 1, 2014

Most security executives clearly understand cyber security is in a class by itself, and the risks associated with ignoring it are immeasurable. They are surrounding themselves with IT and technical security professionals instead of traditional security staffing and former law enforcement personnel.


Read More

Earning Security Success by Monitoring the Marketplace

Knowing what is happening in the marketplace is vital to the success of your enterprise
Mattice-2016-200px.jpg
Lynn Mattice
March 1, 2014

Monitoring emerging trends, customer likes and dislikes, and understanding unmet customer needs can determine how rapid a rate of incline or decline your business experiences. Companies spend millions of dollars conducting surveys of customers, potential customers, industry experts and key opinion leaders to determine if their products or services effectively meet, exceed or miss market expectations.


Read More
Previous 1 2 … 36 37 38 39 40 41 42 43 44 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing