Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Biosignature ID Verification

Taking the Next Step to Secure Online Activity

Positively ID online users by identifying behavior
December 16, 2014

Biosignature ID verification: Positively ID online users by identifying behavior and gestures that are unique to each individual.


Read More

Emergence of Smartphones as a Key Platform for Security Industry

Josh Sookman
November 25, 2014
Convergence and integration have become buzzwords in the security industry, and mostly for good reason.
Read More

The Changing Cybersecurity Landscape

First of a Four-Part Series for National Cyber Security Awareness Month
Dusty Wince
October 8, 2014

From an executive-level perspective, the greatest shift in cybersecurity relates to the focus and the responsibility – moving from strictly an “IT issue” to one of a business function. Look no further than the Target breach and the subsequent resignations of the company’s CEO and CIO to see how cybersecurity has escalated to the C-suite. This was unprecedented 15 years ago, when the primary cybersecurity role of IT was information assurance. So why has the philosophy changed?


Read More

Are Cyber Attacks More than Critical Infrastructure Can C.H.E.W.?

Carl Herberger
September 23, 2014
In August 2013, Former Assistant Defense Secretary for Homeland Defense & Americas’ Security Affairs, Dr. Paul Stockton sat on a panel that discussed cybersecurity challenges facing the electric sector and some of the vulnerabilities in the U.S. electric grid system.
Read More

Join the Conversation: Security and Perception Post-9/11

September 11, 2014

Today, as we remember the terrible events of the morning of September 11, 2001, the staff of Security magazine is considering how far we have come, and how far we have left to go.


Read More

Wage War: Security Officers’ On-Call Compensation Fight May Set New Rules, Tests

zalud-2016-200px.jpg
Bill Zalud
August 21, 2014

So what do famous TV surgeon Marcus Welby and Tim Mendiola, a real-life security officer, have in common?


Read More

Attracting Top Talent is Critical to Physical Security Sector

Jim Gillece
June 10, 2014
As the industry continues to grow, there is an increased need for sophisticated recruiting, screening and hiring processes, as well as a strict commitment to hiring quality personnel who are the right fit for the position.
Read More

How Does the "Heartbleed" Vulnerability Affect You?

April 16, 2014

"Heartbleed" is a catchy name for a cyber vulnerability, but how exactly does it work, and how can you (and your enterprise's employees) be better protected against it?


Read More

Live from ISC West 2014: How 4K Resolution Impacts End Users

April 3, 2014

Ultra High-Definition TV is the new frontier for consumers, but what about enterprise security executives? What should you be asking about this new video surveillance medium, and how could it impact your business?


Read More
To Create Integrated Video Security Solutions Co.

Vicon and IQinVision Announce Merger Agreement

Vicon Expects to Declare a Special Cash Dividend of $0.55 to Shareholders
March 31, 2014

Vicon Industries, Inc., and IQinVision, Inc., announced today (March 31, 2014) that they have entered into a definitive merger agreement.


Read More
Previous 1 2 … 35 36 37 38 39 40 41 42 43 … 174 175 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing