This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Technologies

Technologies
Technologies RSS Feed RSS

SEC0320-prods-slide3_900px
Product Spotlight for Sports Stadiums

Delivers an Audit Trail

March 23, 2020
Maxxess InSite™ merges security, communications, business intelligence and data integration into a single, easy-to-use platform.
Read More
SEC0320-prods-slide2_900px
Product Spotlight for Sports Stadiums

Provides Facial Matching

March 23, 2020

The exacqVision Facial Matching solution, an artificial intelligence enabled system, provides immediate notification of persons of interest who are returning to a venue or other premise.


Read More
SEC0320-rugged-SEC0320-prods-feat-slide1_900px

Product Spotlight on Sports Stadiums

Sporting events themselves might just be a game, but the security technology employed in and around stadiums and other venues can mean a matter of life and death.
Maria Henriquez
March 23, 2020

Sporting events themselves might just be a game, but the security technology, procedures and policies that are employed in and around stadiums and other venues can mean a matter of life and death. Here are some security technologies that some vendors offer.


Read More
Encryption Future - Security Magazine

Security Trial: Are Biometric Authentication Systems Fulfilling Encryption Standards?

Sarah Amundsson
March 20, 2020
Recent data breach incidents that expose personally identifiable information and biometrics highlight the lack of proper authentication and storage protocols. Organizations need to implement effective storage-based strategies to protect the biometric data collected as a result of authentication. Why is data encryption the solution?
Read More
coronavirus

Should Facial Recognition be Used to Identify Individuals with Coronavirus?

March 20, 2020
Facial recognition companies are seeing opportunity in their services with the Coronavirus in identifying individuals without the risk of close contact, according to OneZero. 
Read More
SEC0320-rugged-feat-slide1_900px

Resilient Surveillance in Rugged Environments

When it comes to using video in rugged terrain and remote locations, enterprise security professionals face a range of challenges.
Adam Stone
March 20, 2020

But is the tech ready for mainstream security use?


Read More
coronavirus

Using Mass Notification to Stay in Touch with Remote Workers during Coronavirus

Patscheckel
Pat Scheckel
March 19, 2020
While the overall impact of the coronavirus is still in question, organizations can mitigate the damage it may cause by using mass notification stay in contact with their employees to keep them informed about any changes or developments.
Read More
transwestern 1

Enterprise Security Must Prepare to Respond

An Effective Emergency Response Program is the Heart of Exceptional Service.
Ashdown dan 1
Dan Ashdown
Peterson blake 1
Blake Peterson
March 18, 2020
As the COVID-19 virus has once again brought to the forefront, anticipating potential dangers is essential to meeting this challenge in an environment full of new and evolving risks.
Read More
phishing

Cybercriminals are Exploiting Coronavirus Fears

Luke wilson
Luke Wilson
March 17, 2020
Amid the hysteria over coronavirus (COVID-19), many people know to seek out trusted third-parties for guidance in situations like these, such as the World Health Organization (WHO) or the Centers for Disease Control and Prevention (CDC). But lesser known is the fact that phishing scammers have started capitalizing on the wide-spread fear and uncertainty for their benefit by posing as these authoritative agencies.
Read More
SEC0919-Mobile-Feat-slide1_900px

Can the Tsunami of Phone-Based Social Engineering be Contained?

As soft target telephone scams become more sophisticated, people are turning to protocols like biometric verification for enhanced protection. But implementation is key.
Amankhanna
Aman Khanna
March 17, 2020
As digital security through online portals continually improves and people become more wary of phishing emails, hackers have turned to old fashioned telephone calls to elicit key pieces of personal information they can use for profit. It takes little technical skill—just the ability to sound convincing to vulnerable people over the phone.
Read More
Previous 1 2 … 110 111 112 113 114 115 116 117 118 … 148 149 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • building
    Sponsored byAxis

    Wisconsin’s Deer District scores a winning security plan

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

certification-freepik1170x658v4.jpg

(ISC)2 to offer 1 million free entry-level cybersecurity certification exams

threat-intelligence-fp-1170v57.jpg

4 key cybersecurity threat trends in 2023

people-business-freepik170x658v4.jpg

3 reasons why cybersecurity must be people-centric

cybersecurity manufacturing

It's time for manufacturers to build a collaborative cybersecurity team

medical device security

Healthcare organizations must prepare for looming cybersecurity legislation

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
July 27, 2022

A Layered Approach to Achieve Robust Security

ON DEMAND: Are you confident that your physical security strategy is effective? 

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

SEC shooter detection webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing