Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog » Technologies

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Google, Microsoft Fight Continues with Rumors Flying that Google Will Prohibit Windows Use

June 5, 2010
Microsoft has responded to rumors that Google plans to stop using its products. Writing in a blog post, a Windows communications manager commented on the “coverage overnight about the security
Read More

Certain U.S. Businesses May Soon Use Better Protected Fed Computer System

June 2, 2010
Businesses could use U.S. cyber monitoring system. A U.S. government computer security system that can detect and prevent cyber attacks should be extended to private businesses that operate critical utilities
Read More

Wary about Cloud Computing? Watch Out for Dangers in the “Shadow Clouds”

May 28, 2010
Security has for years been in the cloud thanks to the continued success of alarm monitoring firms. But if you think “cloud networks” and “cloud services” are just buzzwords or
Read More

Walmart Commits to Smart Card Patron Payment System; May Energize Chip-and-PIN Throughout Businesses

May 26, 2010
Retail giant Walmart Stores Inc. is reportedly planning on making all its payment terminals in the U.S. compliant with a smartcard-based credit card technology that is widely used around the
Read More

Bank Security: Firebombing over Vancouver Olympics, U.S. Pushes for Better Online Fraud Protection

May 21, 2010
It seems like Canadian anarchists don’t want to shake off the Vancouver Olympic Games. Just days ago, a group claimed responsibility for a firebomb attack in Ottawa on the country’s
Read More

With Computers in Cars, Can the Hackers be Far Behind?

May 18, 2010
University researchers have taken a close look at the computer systems used to run today’s cars and discovered new ways to hack into them, sometimes with frightening results. The security
Read More

PCI Security Council Updates Requirements for Payment Card Devices

May 15, 2010
The council that administers the Payment Card Industry Data Security Standard has released new requirements that vendors of payment card devices will be expected to incorporate into their products going
Read More

Testimony: Office of Intelligence and Analysis' Vision and Goals

May 13, 2010
Under Secretary and Chief Intelligence Officer Caryn Wagner and Principal Deputy Under Secretary Bart Johnson, before the House Committee on Homeland Security, on the Office of Intelligence and Analysis' Vision
Read More

Cloud Computing Complicates Federal Government Information Security Strategies

May 10, 2010
The federal government is on the cusp of fundamental changes in the way it manages information-technology security risks, but those risks will grow more complicated as agencies begin embracing on-demand
Read More

Mob in Asheville Creates Business Vandal Havoc – Dressed in Black, Armed with Hammers

May 6, 2010
Who would have figured that an American anarchist movement would ring someone’s bells. But police arrested eleven people after a downtown Asheville vandalism spree was carried out by about 30
Read More
Previous 1 2 3 4 5 6 7 8 9 10 … 24 25 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

Coding

Epstein File Data Security Update: Raw Code Found in Emails

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing