Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog » Behind the Curtain

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Airport Security: Some Fever Scanners Work, U.S. Study Finds

October 18, 2010
Two commercially available scanners meant for use in airports and other public facilities can reliably detect people with fevers, making them useful during disease outbreaks, researchers of the U.S. Centers
Read More

A Cowboy Boot Full of New Technology Spotlighted at ASIS Exhibits

October 13, 2010
Security Magazine’s Blog continues on its keyboard tour. Check out these stops. ENERGY STAR qualified, biodegradable supply cores and recyclable packaging make the new Datacard® SD260 card printer the industry's
Read More

Fed Study -- 85 percent of Agencies Still Not Using CyberScope

October 12, 2010
CyberScope is supposed to be the federal government’s new standard tool for continuous security monitoring. So far, however, the vast majority of federal CIOs said they don’t understand the technology’s
Read More

Aldi Food Store Credit Card Skimming Hits New Organized Crime Note

October 8, 2010
When a gang of thieves physically tampers with point-of-sale systems, the tampering is usually a local operation. But that may be changing. Discount grocer Aldi said October 1 it has
Read More

Deloitte/NASCIO Survey: Government Data and Citizens’ Personal Information at Risk

October 5, 2010
According to findings of a recent survey conducted by Deloitte and the National Association of State Chief Information Officers (NASCIO), “State Governments at risk: A Call to Secure Citizen Data
Read More

Polaroid and Screencheck North America Extend Global License Agreement

September 27, 2010
Polaroid and ScreenCheck, a firm in identification systems, say they have extended the global license agreement for Polaroid Commercial Identification Systems. Featuring a full line of expandable and customized professional
Read More

Foreclosure Fraud a Mess – Everything is Fake

September 25, 2010
The nation’s overburdened foreclosure system is riddled with faked documents, forged signatures and lenders who take shortcuts reviewing borrower’s files, according to court documents and interviews with attorneys, housing advocates
Read More

Today’s Statement of Secretary Janet Napolitano before the Senate Committee -- "Nine Years After 9/11: Confronting the Terrorist Threat to the Homeland"

September 22, 2010
Chairman Lieberman, Senator Collins, and members of the Committee: Thank you for this opportunity to testify on the continuing and evolving terrorist threat to the United States. Today I would
Read More

New York Subway System Gets More Security Video

September 22, 2010
New York City, New York activated 500 new subway cameras in heavily traveled stations in response to security threats such as the attempted bombing of Times Square, the mayor said
Read More

EXCLUSIVE: Take a “Walking Tour” of Chicago’s Security Video, Wireless Mesh

September 16, 2010
The Secretary of Homeland Security, in a recent visit to Chicago, took the tour, joined by Security magazine’s Bill Zalud. Now you can from your computer. Chicago’s Office of Emergency
Read More
Previous 1 2 3 4 5 6 7 8 9 … 24 25 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing