Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Unique Insights into 2012 Attacks

In Report, California Says 2.5 Million Residents at Risk in Data Breaches

Organizations Now Mandated to Report to State
July 6, 2013

Electronic data breaches put the personal information of 2.5 million Californians at risk in 2012, according to a report released days ago by Attorney General Kamala Harris.


Read More
U.S. Companies and Assets Targeted

While Snowdon Grabs Headlines, Chinese Grab $800 Million in Intellectual Property

IP Thefts Go Way Beyond Monitoring
July 3, 2013

While some have condemned U.S. National Security Agency monitoring activity, as described by fugitive Edward Snowdon, a bigger, real threat centers on intellectual property theft with America and its corporations most often the target.


Read More
Focus on Public Events as NFL Sets New Rules

In Iowa, Art Criticism or Festival Terror Incident as Higher Security Implemented

Most Bomb Threats are False
June 16, 2013

There continues to be hundreds of bomb threats and incidents, especially at schools, public buildings and summer events. Most are false alarms but law enforcement must still respond in some way. And police and security officials also are implementing higher level precautions.


Read More
Aimed at Intelligent Buildings

Commercial and Retail Buildings Fastest Adopters of Remote Monitoring Services

Moving to Third Party Providers
May 28, 2013

Commercial and retail end users will drive the growth of remote monitoring services in intelligent buildings, accounting for more than 80 percent of the $400 million market in 2016, according to IMS Research, now part of IHS Inc.


Read More
Decline for Second Year

Low Levels of Security Concern, Even After Boston Marathon Bombings

Four areas of security concern surveyed: national, personal, Internet and financial.
May 22, 2013

According to new research conducted by Unisys Corporation, security concern among Americans has declined for the second consecutive year to its lowest level since the company began tracking global security concerns in 2007.


Read More
Busy couple of days for educational institutions.

Schools Faced Bomb Threats, Burglaries and Vandalism Incidents

Bomb threats and vandalism escalate as summer break closes in.
May 18, 2013

It was a busy middle May as school administrators, school security officials and local law enforcement responded to an escalating number of life safety and vandalism threats.


Read More
No Nuclear Power Plant Incident is Minor

Lemonade Pitcher of Goldfish in Security Breach

Now Reviewing Video in Investigation
May 7, 2013

They did not swim in. Two goldfish have been found swimming in slightly radioactive water in a lemonade pitcher inside a secure area of the Perry nuclear power plant, Perry, Ohio.


Read More

The Public’s Role in Preventing Terrorism

Terry Mors Dean C. Alexander
May 2, 2013

In the wake of the Boston marathon bombings much attention has focused on domestic and foreign intelligence gathering, analysis, and sharing as well as law enforcement responses to terrorism.


Read More
Energy Company Says Its Customer Will Pay

Huge Copper Theft Ring Is Broken Up

18 Arrested in Connection with Arizona Copper Theft Ring
May 2, 2013

In Arizona, law enforcement just broke up a copper theft ring that stole $10 million in the metal. In Kansas, an energy firm hit by thefts said it will make ratepayers cover the losses.


Read More

Terrorists: Why do they do what they do?

April 28, 2013

Discussing the Boston Marathon bombers, Vice President Joe Biden aptly asked, “Why do they do what they do?”


Read More
Previous 1 2 … 38 39 40 41 42 43 44 45 46 … 174 175 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Cyber tech background

Security’s Top Cybersecurity Leaders 2026

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing