Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured on Home Page

Featured on Home Page
Featured on Home Page RSS Feed RSS

Alternative Technologies Set the Pace for Future Video Surveillance

Alternative Technologies Set the Pace for Future Video Surveillance

Alternate surveillance technologies are emerging as tools for added transparency within enterprises.
Jim Romeo
May 1, 2017

In late February 2017, Oklahoma City Police Officers responded to a call of alleged illegal activity, where, soon after their arrival a foot chase pursuit began of a suspect who fled the scene.


Read More
Smart Card Uses Continue to Expand Across Sectors

Smart Card Uses Continue to Expand Across Sectors

Healthcare, higher ed, critical infrastructure and the corporate world embrace ID cards for security and more.
Ed Finkel
May 1, 2017

The same secure chip technology that’s been rolled out in the banking world for ATM and credit card transactions is sweeping across sectors throughout the American economy.


Read More
Insider Threat – One of the Biggest Risks We Face

Insider Threat – One of the Biggest Risks We Face

Mattice-2016-200px.jpg
Lynn Mattice
May 1, 2017

The Obama Administration had more damaging leaks than any Presidential Administration in modern history.


Read More
What Role Do Certifications Play in Your Career?

What Role Do Certifications Play in Your Career?

Brennan-2016-200px.jpg
Jerry J. Brennan
May 1, 2017

Historically there has been a shortage of college and university-level education programs focused on the knowledge, skills and competencies required for effective management of corporate security risk-related activities.


Read More
Been Hacked? Let That Be a Lesson to You

Been Hacked? Let That Be a Lesson to You

Chabinsky-2016-200px.jpg
Steven Chabinsky
May 1, 2017

If at first you don’t succeed, try, try again.” Although catchy, we all know that the real keys to success after failure are reflection and adaptation, not mere persistence.


Read More
k9-enews

3 Factors for Explosive-Detection Canine Use in Stadium Security

Jeffrey B. Miller
April 25, 2017
Modern day sports venue security is uncompromising and ever-evolving. Sports venues require a robust security posture to protect fans, players, staff and venue. Explosive threats, specifically Vehicle Borne IED (VBIED) and Person Borne IED (PBIED), have become prevalent, requiring an effective security solution.
Read More
The Danger Within: Confronting the Insider Threat

The Danger Within: Confronting the Insider Threat

Insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats.
diane-2016-200.jpg
Diane Ritchey
April 1, 2017

Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime.


Read More
Product Spotlight: Ultra HD Video Solutions

Product Spotlight: Ultra HD Video Solutions

Sarah Sameei
April 1, 2017

Ultra-HD video surveillance cameras are built to cover more ground and provide more detail, but they can also replace more cameras.


Read More
Workplace Bullying: How Security Professionals Can Help

Workplace Bullying: How Security Professionals Can Help

Bullies poison their work environment with low morale, fear, anger, gossip and depression. The employer pays for this in lost efficiency, absenteeism, high staff turnover, severance packages and lawsuits.
Jim Sawyer
April 1, 2017

Workplace bullying is not a topic often explored by enterprise security professionals. However, this will likely change in the coming years, given the scope and the immensity of the problem.


Read More
How to Evaluate Your Security System's Cyber Risk

How to Evaluate Your Security System's Cyber Risk

Between security systems manufacturers, integrators and end users, is anyone fully prepared to mitigate cybersecurity risk?
April 1, 2017

Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property.


Read More
Previous 1 2 … 269 270 271 272 273 274 275 276 277 … 292 293 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing