Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

cyber insane

Has Cybersecurity Become the Definition of Insanity?

After years of breaches, stolen data, CIO/CISO resignations and huge impacts to business reputation, it’s time for the industry to rethink its approach to network security.
Paul German
December 6, 2018
After years of breaches, stolen data, CIO/CISO resignations and huge impacts to business reputation, it’s time for the industry to rethink its approach to network security.
Read More
Education - Security Magazine

Facing Litigation, Organizations Buy into Active Shooter Insurance

December 3, 2018

As the number of active shooter events increases dramatically, more and more lawsuits are being brought against employers in their wake.


Read More
Holiday Travel

5 Holiday Travel Safety Tips

Matthew Bradley
Matthew Bradley
November 21, 2018

The holiday season is upon us and with it comes the busiest travel season of the year. Preparing for every scenario during the chaos will allow you to travel safely and confidently.


Read More
John Minster, TD Bank

The Purpose of Innovation: A Focus on Industry-Wide Solutions at Axis Communications Partner Event

November 6, 2018

“What is the ultimate goal of innovation?” asks Fredrik Nilsson, Vice President of the Americas, Axis Communications. His answer: bringing value to the entire security ecosystem – from other manufacturers to dealers to integrators to end users.


Read More
Church

A 5-Step Plan for House of Worship Security

November 5, 2018

While places of worship have certainly been sites of active assailant incidents, they pose a unique conundrum to security advocates and congregations – how do you secure your place of worship while maintaining a welcoming atmosphere for congregants, visitors and those in need?


Read More
europe-enews

Four Years in Europe: Lessons in Cybersecurity

europe-enews
Oliver Tavakoli
November 1, 2018
A recent week-long trip to Europe provided an interesting perspective on how much the state of cybersecurity sentiment in European companies has changed.
Read More
ITprofessional-enews

Redefining the Role of a Cybersecurity Professional

Manju Mude
Manju Mude
November 1, 2018

The cybersecurity industry has been around for more than 30 years and undergone exponential growth, but in many ways it is still defining itself in the face of evolving threats. Technology and process are predictably playing a role. But diversity of talent has also become increasingly important to the success of security organizations and is redefining the role of a cybersecurity professional.


Read More
school

Why You’re Hearing “No:” Insurance Considerations for Security Firms Serving Schools

Brownyard headshot
Tory Brownyard
October 16, 2018
As we reflect on the first anniversary of the Mandalay Bay shooting, it is sobering to consider the real risks facing any large group of people. A gathering of hundreds or thousands of people is vulnerable to attacks of violence and, unfortunately, over the past several years, we have seen that schools are also such targets.
Read More
digital workplace

Overcoming Human Error to Secure the Smart Workplaces Transformation

Larry-Lunetta
Larry Lunetta
October 4, 2018
It’s no secret that the workplace is getting smarter every day. Through an increasingly connected world, new capabilities such as location-based services and “smart” buildings are becoming more commonplace to create today’s experience-based economy. In the not-so-distant-future, digitally-driven interactions that are personalized for employees, customers and partners will become the norm.
Read More

Are You at Risk for Unauthorized Access?

September 17, 2018

Not every incident of unauthorized access is a criminal break-in – some of the most common types spring from common courtesy, like holding the door for a colleague.


Read More
Previous 1 2 … 25 26 27 28 29 30 31 32 33 … 174 175 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing