Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Infrastructure Security Concerns Grow

Hints that Simple Password May Link to Water Treatment Plant Breakin

Recent Attacks in Texas and Illinois
November 25, 2011

While some security experts spotlight transportation, electricity, and communications infrastructure for more protection, recent attacks on water treatment plants worry them, too.


Read More
Turns Out Theft Not Rare

Waiters at Top NYC Steakhouses in Identity Theft Ring

Stole Credit Card Info at Restaurants
November 21, 2011

The alleged scam targeted customers who often paid with American Express Black cards and other high-limit credit cards.


Read More

Security Video Captures Violent Attack, Helps Make Arrest

November 15, 2011
Police have arrested a homeless man in connection with a violent robbery of an elderly man in a Bronx apartment building earlier this month and that was captured on surveillance video. Cameron Roebuck, 20, faces robbery charges.
Read More
Tried a US-wide Emergency Alert Test

First Nationwide Emergency Alert System Test Hits Glitches

Some Failed to Air Test at all
November 14, 2011

A nationwide emergency alert test last week proved less than perfect with a number of technology and local coordination mistakes.


Read More
Theft Ring Hidden in Mobile Phone Business

Secret Service Agents Catch Group Stealing Card Numbers with Skimmers

Security Officials from Target Stores Helped with Evidence
November 6, 2011

As skimming grows, the good news is that two men were arrested November 1 on charges of conspiring to produce, use, or traffic in one or more counterfeit devices, following a lengthy U.S. Secret Service investigation.


Read More
Group Aimed at Government Officials

Lonely Night in Georgia for Four Potential Terrorists Planning Ricin Attack

Following Plot of a Popular Online Novel
November 6, 2011

Four men intended to use an online novel as a script for a real life wave of terror and assassination using explosives and the lethal toxin ricin so they could carry out targeted attacks on government buildings and employees.


Read More
Security Seeks Overall Scene, Accurate Information Fast

Time to Get Complete Picture Across All Devices, Systems

Exclusive Survey Shows Complexities, Diverse Risks Demand a PSIM Approach
October 28, 2011

A majority of security professionals believe that there is much to gain by integrating data from traditional physical security devices and systems, including access control, video, RFID, GPS, sensors and building management systems, in to one common operating picture.


Read More
Analytics Has Come a Long Way

Is Video Analytics Ready for the Mainstream?

From Niche to Overall Business Tool
October 25, 2011

In its short history, the potential of video analytics has progressed from use in limited, niche applications to its current potential as a mainstream tool within the reach of any video end user.


Read More

On the Track of OSAC: The Country Council Chronicles, Seattle, Washington

John McClurg
John McClurg
October 21, 2011
I can think of no more an appropriate way to cap our three-country survey of Asia than with the Pan-Asia Regional Council (PARC) meeting, graciously hosted by the Bill and Melinda Gates Foundation--nor any more appealing venue than their beautiful new, (extremely "green") offices located in the shadow of the "Space Needle" here in Seattle.
Read More

On the Track of OSAC: The Country Council Chronicles, Seoul, Korea

John McClurg
John McClurg
October 20, 2011

Korea is said by some to be more than 5,000 years old. It's in the heart of that antiquity that our delegation convened in Seoul where we continued a cyber-focused theme in our discussions of the particular security challenges faced here in Korea. While not my first time in this ancient country—the only nation in the world that yet remains divided—it is my first visit since having joined the ranks of the private sector.


Read More
Previous 1 2 … 49 50 51 52 53 54 55 56 57 … 173 174 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

Coding

Epstein File Data Security Update: Raw Code Found in Emails

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing