Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Theft Ring Hidden in Mobile Phone Business

Secret Service Agents Catch Group Stealing Card Numbers with Skimmers

Security Officials from Target Stores Helped with Evidence
November 6, 2011

As skimming grows, the good news is that two men were arrested November 1 on charges of conspiring to produce, use, or traffic in one or more counterfeit devices, following a lengthy U.S. Secret Service investigation.


Read More
Group Aimed at Government Officials

Lonely Night in Georgia for Four Potential Terrorists Planning Ricin Attack

Following Plot of a Popular Online Novel
November 6, 2011

Four men intended to use an online novel as a script for a real life wave of terror and assassination using explosives and the lethal toxin ricin so they could carry out targeted attacks on government buildings and employees.


Read More
Security Seeks Overall Scene, Accurate Information Fast

Time to Get Complete Picture Across All Devices, Systems

Exclusive Survey Shows Complexities, Diverse Risks Demand a PSIM Approach
October 28, 2011

A majority of security professionals believe that there is much to gain by integrating data from traditional physical security devices and systems, including access control, video, RFID, GPS, sensors and building management systems, in to one common operating picture.


Read More
Analytics Has Come a Long Way

Is Video Analytics Ready for the Mainstream?

From Niche to Overall Business Tool
October 25, 2011

In its short history, the potential of video analytics has progressed from use in limited, niche applications to its current potential as a mainstream tool within the reach of any video end user.


Read More

On the Track of OSAC: The Country Council Chronicles, Seattle, Washington

John McClurg
John McClurg
October 21, 2011
I can think of no more an appropriate way to cap our three-country survey of Asia than with the Pan-Asia Regional Council (PARC) meeting, graciously hosted by the Bill and Melinda Gates Foundation--nor any more appealing venue than their beautiful new, (extremely "green") offices located in the shadow of the "Space Needle" here in Seattle.
Read More

On the Track of OSAC: The Country Council Chronicles, Seoul, Korea

John McClurg
John McClurg
October 20, 2011

Korea is said by some to be more than 5,000 years old. It's in the heart of that antiquity that our delegation convened in Seoul where we continued a cyber-focused theme in our discussions of the particular security challenges faced here in Korea. While not my first time in this ancient country—the only nation in the world that yet remains divided—it is my first visit since having joined the ranks of the private sector.


Read More

On the Track of OSAC: The Country Council Chronicles, Shanghai, China

John McClurg
John McClurg
October 19, 2011
We're here in Shanghai, considered by many as "the Paris of the East", where the stage is set for our next chapter of the Country Council Chronicles.
Read More
Stressing a Secure Cyber Environment

DHS Secretary Napolitano Occupies Wall Street to Spotlight Cyber Security Awareness

Events Aimed at Business, Security Executives and the Public
October 18, 2011

Working more closely together, cybersecurity partners from law enforcement and the private sector are increasing their efforts to combat cyber crime, as part of National Cyber Security Awareness Month.


Read More
In the U.S., there are 141 cybercrime victims every minute.

Cybercrime Losses over $388 Billion in 2010

Incidents grow by three percent annually.
October 18, 2011

According to a recent Norton Cybercrime Report, 431 million adults in 24 countries experienced some type of cybercrime over the past year.


Read More

On the Track of OSAC: The Country Council Chronicles, Tokyo, Japan

John McClurg
John McClurg
October 17, 2011
Seven months after a 9.0 earthquake and devastating Tsunami hit Japan, claiming at least 15, 821 lives and causing what some estimate could exceed over $300 billion dollars in damages, the last of this year's joint Public/Private OSAC delegations arrived in Tokyo, the first of three key stops in Asia: Tokyo, Shanghai, and Seoul. As one makes their way from Narita International Airport, one sees no visible signs of any lingering effects of those horrific days (although I'm told that apparently the Tokyo Tower is still slightly bent). Most of those effects are yet being dealt with much further to the north.
Read More
Previous 1 2 … 48 49 50 51 52 53 54 55 56 … 172 173 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing