Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Technologies & Solutions

Technologies & Solutions
Technologies & Solutions RSS Feed RSS

Top 3 Misconceptions About Data After Death - Security Magazine

Using a Privacy-First Mindset to Transform Data into Intelligence

Robert Burcham
Robert Burcham
May 19, 2020
Why does the practice of Data Economy typically requires a solid understanding of the characteristics of the underlying data resource? And how can that data be transformed into useful intelligence, where these processes are carried out with the upmost care to represent the interests of the Data Subject?
Read More
cyber

Industrial Network Cybersecurity: Debunking the Myths and Adopting Best Practices

Alvis Chen
May 15, 2020
Why is cybersecurity so often overlooked by Operational Technology engineers? The answer can be traced to four common myths. Here, we explore why these four misconceptions are no longer true in today’s highly interconnected world and discuss the differences between IT and OT networks, and share some best practice guidelines to help your organization successfully overcome these IT-OT differences and transition to IIoT or Industry 4.0 systems.
Read More
SEC0818-cyber-feat-slide1_900

78% of Organizations Use More than 50 Cybersecurity Products to Address Security Issues

May 15, 2020
Data security is creating fear and trust issues for IT professionals, according to the third-annual Oracle and KPMG Cloud Threat Report 2020. T
Read More
cybersecurity

Top Tips to Lockdown Remote Network Security Now

Amit Bareket
May 15, 2020

Though anticipating and preparing for the future is always smart business, there are some industries which take it a step beyond the norm. In cybersecurity, the concept of “future proofing” is essentially the modus operandi everyone adheres to considering just how quickly a massive breach can turn the tide on our collective defenses. By their very nature, security professionals are constantly preparing to head off new threats by diagnosing them and creating an active defense model that makes it nearly impossible - and absurdly expensive - for hackers to get at their data.


Read More
SEC0520-spot-slide4_900px
Product Spotlight

Thermal Camera with Alarm System

May 15, 2020

The Hikvision DS-2TD1217-2/V1 Thermal & Optical Network Turret Camera, equipped with a built-in GPU, supports intelligent behavior analysis algorithm and can realize high precision VCA detection and real-time alarms.


Read More
SEC0520-spot-slide3_900px
Product Spotlight

Provides One Platform for Video

May 15, 2020

The Genetec Security Center platform effectively combines cultivation facilities’ and dispensaries’ IP-security systems in one platform, offering true seed-to-sale tracking on all of their products.


Read More
SEC0520-spot-slide2_900px
Product Spotlight

Integrates with Retail POS Systems

May 15, 2020

March Networks’ Searchlight for Retail software is now integrated with Cova, a point-of-sale (POS) software system designed specifically for cannabis dispensaries.


Read More
SEC0520-spot-Feat-slide1_900px

Product Spotlight on Cannabis Security

Maria Henriquez
May 15, 2020

The legalized marijuana industry is one of the fastest-growing industries in the U.S. Here are some solutions available to cannabis growers and dispensaries that may help comply with security and surveillance requirements.


Read More
gun

How Active Shooter Technology can Enhance Emergency Response

john krumme
John Krumme
May 12, 2020
Active shooter technology has become a valuable tool that many security professionals are giving more consideration to, in light of the gun violence tragedies we see in our society on a regular basis. It’s important for security, facilities and IT directors to become familiar with active shooter technology to fully understand how it can be deployed, and how it benefits their company, employees and assets.
Read More

How to Improve Efficiency, Reduce Fraud and Enable Intelligence in Credit Unions

matt tengwall
Matt Tengwall
May 12, 2020
When an incident or disaster occurs, security and fraud investigators go to work. They must be able to rely on innovative processes and tools that allow them to swiftly locate and analyze the information needed to determine the proper resolution or action. Credit unions need intuitive solutions that can be leveraged across multiple departments in a moment's notice to be more efficient and effective in today’s challenging environment.
Read More
Previous 1 2 … 139 140 141 142 143 144 145 146 147 … 210 211 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing