Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

Multi-Factor Authentication - Security Magazine

Multi-Factor Authentication Should Be HARD

Chabinsky-2016-200px.jpg
Steven Chabinsky
February 1, 2018
How difficult is it for a computer (or a complete stranger) to validate the true identity of a person they don’t know? Very difficult, it turns out, especially when others may be trying to imitate them.
Read More
merger-enews

Q&A: How Are Cyber Risks Changing Mergers & Acquisitions?

January 31, 2018

With companies’ reputations and futures becoming more inherently tied to their cybersecurity efforts, Security magazine connected with Kevin Richards, managing director of North American Security and global lead for Security Strategy and Risk at Accenture, to discuss the outcomes of negligent cybersecurity oversight during mergers and acquisitions.


Read More
budget-enews

Getting the Greenlight: How to Sell Video Surveillance Systems to the C-Suite

ScottDunn
Scott Dunn
January 30, 2018
If you would love to upgrade or expand your security technology but are struggling to get the funding, I’d like to suggest a few strategies that could get your project the greenlight.
Read More
cloud-enews

How to Utilize the Cloud to Mitigate Cybersecurity Risks to Security Hardware

Mathieu Chevalier
January 30, 2018

Today, cybersecurity is on all our minds. Every other day, we get news of another cyberattack. As more organizations struggle to keep up with the onslaught of these new threats, many are asking: “What can we do to strengthen our cybersecurity posture?” When we want to quantify it, consider the concept of risk. In its simplest form, the risk associated with a system is the impact of it malfunctioning, multiplied by the likelihood that a malfunction will occur.


Read More
city2-900px.jpg

Can We Be Smarter Than The Smart Cities We’re Building?

Peter Alexander - Security Magazine
Peter Alexander
January 27, 2018

Imagine a world where everything is connected. All information and communication technologies are integrated into a single, consolidated platform.


Read More
leadership

Insider Threat Programs: A Beginner’s Guide

Frank Figliuzzi - Security Magazine
Frank Figliuzzi
January 22, 2018

What your company spent years to develop can be lost in an instant at the hands of one bad intentioned employee.


Read More
money-enews

How to Avert Buyer’s Remorse: 6 Questions for Smart Security Shopping

Ryan Gregory
January 16, 2018
Shopping for the right security system can be daunting. The seemingly infinite variety of components and options can be overwhelming. Make the wrong choices and you could be stuck with buyer’s remorse for years to come. So what does it take to become a smart security system shopper? It all comes down to asking the right questions of the right people. If you approach the shopping challenge with thoughtful deliberation, the end result will yield benefits well beyond your initial expectations.
Read More
Product Spotlight: New Intercoms and Mass Notification Systems - January, 2018 - Security Magazine

Product Spotlight: New Intercoms and Mass Notification Systems

January 15, 2018

During a recent Security magazine webinar, the majority of attendees stated that they are looking for mass notification and audio products to improve emergency response during an active shooter incident.


Read More
cyber5-900px.jpg

Cutting the Cost of Public Sector Cybercrime in 2018

Ger Daly - Security Magazine
Ger Daly
January 12, 2018

Sophisticated cyber threats against governments are increasing in frequency and severity, demanding heightened vigilance.


Read More
Why Organizations Should Care About BYOD - Security Magazine

Why Organizations Should Still Care About BYOD

How BYOD has changed... potential risks and advice from seasoned experts.
Sarah Ludwig
January 11, 2018
Though there are big benefits to having a BYOD program, including boosting employee productivity and morale, as well as possible cost savings, security risks are a critical concern.
Read More
Previous 1 2 … 272 273 274 275 276 277 278 279 280 … 306 307 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing