Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

Office building

Mobile and IoT Devices: Enabling Remote Access

Steven Turney
Steven Turney
February 21, 2019

As many industries adopt IoT solutions for increased security, reduced costs and new opportunities, the buildings industry is looking to do the same by incorporating IoT and mobile functionality into a range of facilities, including around building security systems.


Read More

How to Run a Smooth, Large-Scale Event Emergency Preparedness Exercise

Troy Harper
Troy Harper
February 19, 2019

Federal, state and local agencies spent months preparing for the 2019 Super Bowl LIII in Atlanta, game planning for the multitude of incidents that could threaten the safety and security of fans attending the game, as well as individuals and businesses that congregated in areas around the stadium.


Read More
Doorway to Cybersecurity

Why Corporations Need to Give Employees Personal VPNs

Greg Falco
Greg Falco
February 18, 2019

Late last year, the House Energy and Commerce Committee’s Subcommittee on Oversights and Investigations released its Cybersecurity Strategy report, which starts by observing that current IT strategies aren’t working.


Read More
9/11 flags

Understanding Family Terror Networks

Dean C. Alexander
February 15, 2019

What can law enforcement and enterprise security do to undermine terrorism, including that of the family affiliated variety?


Read More
SEC0219-prod-Feat-slide1_900px

Product Spotlight: Thermal and Day/Night Cameras

February 14, 2019

Whether you’re charged with protecting a remote perimeter or a facility with frequent lighting changes – such as a lobby or garage – getting usable results from your surveillance program without abundant false alarms can be challenging.


Read More
smartphone1-900px.jpg

Smartphone Bans are Taking a Toll on the Federal Workforce

Mike Fong updated
Mike Fong
February 13, 2019

As if changing missions, resource shortages and salary pressures weren’t big-enough challenges, many federal workers must deal with another hurdle that’s been largely overlooked: smartphone bans.


Read More
analytics

Analytics on the Edge vs. on the Server – What’s Right for Your Business?

Paul Kong
February 12, 2019
There are several options to consider when it comes to analytics for video surveillance systems: deploy analytics on the edge, or “in-camera”; use a dedicated server; or use a hybrid approach which leverages both edge and server implementations.
Read More
LGBTQ

Protecting the LGBTQ Mobile Workforce

Matthew Bradley
Matthew Bradley
February 12, 2019
With the rapid growth of business travelers, especially millennial business travelers, companies often find it difficult to manage travel safety, health and security of their employees. This rapid growth also brings changes to the diverse composition of a mobile workforce and the risks associated with it. As the modern workforce continues to grow, there is no one-size-fits all approach to answering questions surrounding workplace law and lesbian, gay, bisexual, transgender and queer or questioning (LGBTQ) employees.
Read More
rackspace-wargames

Moving to a State of Resiliency: Why War Games Are the Key

kelly_brian
Brian Kelly
February 7, 2019
You can’t simply learn resiliency; there isn’t a book or set of checkmarks you can apply to a list that means you are resilient. Instead, it’s real-world training like War Gaming that delivers the closest “I’ve been there” experience and creates the muscle memory needed to respond effectively when an incident – and all the fear, confusion and paralysis it can bring – occurs.
Read More
stressed

Departing the Profession: Why Infosec Burnout is a Bigger Deal Than We Think

Marc French
February 7, 2019
Today, a fellow CISO of mine sent out a flash over our private CISO bat channel (yes, we do have these) saying he was leaving his role and heading off to not “do security” anymore. As I read the note, it struck me that this was not the first time I had seen this same scenario in the past month.
Read More
Previous 1 2 … 255 256 257 258 259 260 261 262 263 … 313 314 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing