Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

What Will Happen with Security Video This Year.

IMS Research Predicts Biggest Trends of 2011

Video Will Range from Analytics and HD to the Cloud
January 7, 2011

Security video is at the forefront of technologies that will appeal to enterprises, cities and law enforcement this year. Here are nine trends to watch.


Read More

A Disability Notification Card from the TSA: Solution or Failure?

diane-2016-200.jpg
Diane Ritchey
January 5, 2011

In response to public outcries and almost daily news reports about blunders in airport security, TSA says it's got a new way for passengers with disabilities to go through airport security.


Read More
Homeland Secretary Visits Israel and Airport There

Secretary Napolitano with Israeli Prime Minister Benjamin Netanyahu: Reconfirms Security Relationship, Tours Airport

Special visit to a special ally.
January 4, 2011
U.S. Homeland Secretary Janet Napolitano visited Ben Gurion International Airport to meet with airport officials to discuss ways both nations are enhancing global aviation security while streamlining legitimate travel and trade. Israeli airport security has been very effective.
Read More
Cyber Threats Go Complex and International

Top 9 Security Threats of 2011; Vietnam-linked Cyber Gang Busted in Minn.

Expect more attacks from inside and from overseas countries.
January 4, 2011
Enterprises and their chief security and information officers face a tough and tumble 2011 with an example being an incident in Minnesota involving Vietnam-based criminals.
Read More
Recent Hospital Killings Among Workplace Violence Incidents

Another Maryland Hospital Killing, Among Growing Number of Workplace Violence Incidents

Maryland area hospitals in the crosshairs.
January 4, 2011
A stabbing at the Suburban Hospital in Bethesda is latest in Maryland-based hospital tragedies as workplace violence becomes a great healthcare threat.
Read More
Better life safety at nucelar power plants.

First U.S. Nuclear Plant Switches to Automated Fire Detection System

First plant in U.S. to move to new tech.
January 2, 2011
Watchman patrols will be outdated sooner or later as nucelar power plants shift to automated fire detection systems that can be zoned.
Read More
Transportation security again questioned.

Can Trains, Subways be Protected from Terrorists?

Many vulnerabilities may not be fixable.
January 2, 2011
A national newspaper examination contends that train and subway infrastructure is more vulnerable to threats and that vastly more people are carried on these systems than airlines.
Read More
Security Technology Catches Alleged Bomb Caller

Campus Emergency Phone, Coupled with Security Video, Nabs a Fake Bomb Caller

Person May Have Been Involved in Numerous Incidents.
January 2, 2011
A combination of an emergency phone, on which a threat was called in, and security video in the area may have put an end to incidents on the University of Florida campus.
Read More
Terror Threat to Global Oil Shipments

Terror Mystery: Explosives Likely Caused Damage to Tanker, according to Japanese Experts

Was It an Accident or Terror Attack?
December 30, 2010
Incident involving a Japanese oil tanker in the Strait of Hormuz last July may indicate a steup in terror tactics.
Read More
Pilot Video Critical of TSA Pulled Down

San Francisco Airport Defends Security in Wake of Pilotâ??s Videos

Conflict Over Treatment at Airport
December 30, 2010
A series of videos shot and narrated by a commercial pilot kicks up dust at San Francisco airport.
Read More
Previous 1 2 … 58 59 60 61 62 63 64 65 66 … 172 173 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing