Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

Unconventional Security-July-2018

Unconventional Security: Managing Safety & Security for Conventions

July 9, 2018

The security industry’s calendar seems to revolve around a few key events: ISC West, ASIS International’s Global Security Exchange (GSX), ISC East… But have you ever considered how much effort goes into securing tradeshows and other large-scale events?


Read More
In-Car Video 1 July 2018

In-Car Video Proves Valuable in University Security Operations

How one mid-sized university department is successfully using valued-engineered, in-car video surveillance systems.
CPT. Dennis Schumaker Jeff Karpovich CPP, CHPA
July 6, 2018

Police have benefited from in-car video and surveillance for decades, but private security departments rarely utilize this asset. Here’s why: Since most security departments do not perform vehicle stops, in-car video systems are not believed to be of value. Also, cost is a deterrent.


Read More
cyber-person

A Seismic Shift: What California’s New Privacy Law Means for Cybersecurity

John Adams
July 5, 2018
Like the GDPR before it, the CCPA is getting a lot of attention because of the rights California residents will have to access data held by companies, to have that data removed, and to prohibit the sale of personal data. The new law, which does not go into effect until 2020, also creates the potential for some eye-popping payments directly to consumers impacted by a breach.
Read More
equipment-enews

5 Guidelines for IT Pros Evaluating and Selecting Physical Security Solutions

Jeff Coco
July 5, 2018
An IP camera is simply a computer with a lens on it. In the IoT age, cybersecurity is only as strong as the weakest link in the overall network ecosystem. As a result, cyber hardening is essential for anything connected to the network.
Read More
Employee Abuse slide 1

Employee Abuse Tops List of Healthcare Security Concerns

Access control, cameras and culture change are among the remedies security directors have in mind.
Ed Finkel
July 3, 2018

Violence perpetrated against employees by patients, their families, and unauthorized visitors – including estranged members of employees’ own families – tops the list of concerns and threats for healthcare security directors.


Read More
police1-900px.jpg

Was the Capital Gazette Shooting a Reminder of Security Responsibility?

A. Benjamin Mannes
A. Benjamin Mannes
July 3, 2018

On June 28, 2018 at 2:40PM eastern time, shots rang out at the offices of the Capital Gazette, a local newspaper covering Annapolis, Maryland. The shooting resulted in the deaths of five people and injuries to two others.

 


Read More
SEC 0718 cover feature

Training for Better Sports Security: See Something, Say Something, Do Something

Sports security leaps forward with proactive game day training and information-sharing.
Claire Meyer
July 1, 2018

“The country’s come quite a long way. Fans now expect security, and it made me feel good that I could take my wife and daughter to a baseball game, spend a couple hundred dollars, and feel safe about it,” says Adam Stockwell, Vice President of Security for the Milwaukee Bucks.


Read More
SEC0718-edu-feat-slide1_900px

How Intelligence Analysis Can Drive Corporate ROI

Daniil Davydoff
Daniil Davydoff
July 1, 2018

Go to any security conference and you’ll be quick to discover that getting “buy-in” and maintaining a “seat at the table” are still the predominant concerns among security leaders. After all, unlike other business units that bring in revenue directly, corporate security must show that it is not merely a cost center but a cost- (and sometimes a life-) saver.


Read More
The Corner Office - july 2018

The Best Technology Ever Created

Phil Aronson
Phil Aronson
July 1, 2018

I love technology. My college degree is in math. I enjoy solving problems using technology. I love its disruptive nature. It can force us to rethink the way we do things. It changes us; how we think of ourselves, our families, our work and our society. It provides hope to the crippled, opportunities for the poor and disenfranchised, and healing for our environment. Its potential is a two-sided blade. It can harm us or help us. It can be used for good or evil.


Read More
Cyber Tactics - july 2018

Managing Supply Chain Risk

Chabinsky-2016-200px.jpg
Steven Chabinsky
July 1, 2018

When NIST recently updated its Cybersecurity Framework, it added only one new core category: Supply Chain Risk Management (SCRM). Placed within the Framework’s “Identify” function, SCRM encompasses, but typically extends beyond, traditional vendor management approaches. That’s because the supply chain typically extends beyond suppliers to include other external parties, such as integrators and even third-party communications providers.


Read More
Previous 1 2 … 262 263 264 265 266 267 268 269 270 … 306 307 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing