Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Los Angeles International Airport Made More Secure With Fiber Optic Solutions

September 28, 2008
The Los Angeles International Airport (LAX) is one of the busiest airports in the world. It handles thousands of domestic and international flights each year and hosts countless visitors.
Read More

IP Convergence Training at ISC East

September 28, 2008
It’s Wednesday, October 29, 8:00am 5:00 pm. In New York City at ISC East. Convergence. Integration. It's where the industry is headed. Now, you have the opportunity to get
Read More

iSee Video

September 24, 2008
Generate RMR providing easy to install Internet video access The integrated plug-in EOP (Ethernet over power) system provides an easily installed means of generating added RMR by offering new or
Read More

Post ASIS -- Continental Access: Exit Switches & REX Motion Sensors

September 21, 2008
Continental Access showed off a wide range of extremely durable exit switches and REX motion sensors that are made in the U.S.A. All of our sensors and switches easily
Read More

Regional Transit Authority Selects $3.8 Million Video, Communication Solution

September 21, 2008
Zalud’s Blog was told by TAC that it has been awarded a $3.8 million contract to install an integrated video monitoring and emergency communications system along the Port Authority
Read More

Megapixel IP-Network Cameras

September 21, 2008
The experts that Zalud’s Blog talked with at ASIS last week were both excited and cautious about the megapixel rush. Sony showed off a comparison of different levels of
Read More

POST ASIS -- Serverless Computing

September 21, 2008
Among the talk at ASIS: new types of platforms. For example, Pivot3 Serverless Computing platform allows security end-users to absorb compute-intensive workloads, now performed using stand-alone application servers, into
Read More

Cloud Computing – In the Clouds with Feet on the Ground

September 21, 2008
Security Magazine’s September print issue featured a cover story on Innovations and Technologies and, among those spotlighted, was cloud computing in which end-users who previously bought hardware and software
Read More

Smart Card Alliance Physical Access Council

September 16, 2008
Through its white papers, panels and demonstrations at industry events, and feedback on new standards, the Smart Card Alliance Physical Access Council has become the go-to resource for U.S.
Read More

Culture of Excellence at ASIS 2008

September 16, 2008
AlliedBarton Security Services, www.AlliedBarton.com, celebrated its culture of excellence at ASIS 2008, Booth #1735, at the Georgia World Congress Center, September 15-18th. The company's commitment to providing responsive local
Read More
Previous 1 2 … 136 137 138 139 140 141 142 143 144 … 174 175 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing