Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Growing Threats

White Collar Crime Grows -- One in Four Households Impacted

Businesses, Organized Crime Involved
December 15, 2010
White collar crime now affects more Americans than all other forms of crime combined, according to a new report published by the the National White Collar Crime Center (NW3C).
Read More

At Orlando Airport -- FAA Badge Theft Could Cause Serious Trouble

November 15, 2010
Investigators continue to work on a case that could be a possible security problem at Orlando International Airport in Orlando, Florida An official from the Federal Aviation Administration (FAA) had
Read More

No Problem?: Some Real Estate Brokers Accused or Convicted of Fraud Still Licensed in California

November 15, 2010
The Sacramento Bee in California found dozens of real estate professionals — people who have been charged with real estate-related crimes or sued by the state for fraud-related misdeeds, or
Read More

Mexico Violence Costs $350K Daily in Natural Gas Losses

November 15, 2010
Threats and violence by drug gangs are preventing some government oil workers from reaching installations in northern Mexico and costing state-owned Petroleos Mexicanos (Pemex) about $350,000 every day in lost
Read More

More Security Incidents and Breaches – Exclusive Before Release of CompTIA Trends Study

November 15, 2010
Sixty-three percent of U.S. organizations responding to CompTIA’s 8th Annual Global Security Trends Study say that they have experienced at least one security incident or breach during the past year.
Read More

Commuter Train Security Proves Costly and Neglected – Case in Point, D.C. Metro

November 10, 2010
Missing security features on the new rail line linking Loudoun County, Virginia, to the Washington D.C. region’s Metro system were identified in a triennial audit by the Tri-State Oversight Committee.
Read More

Private Medical Practices Lag Behind Hospitals in Data Security; More Development Dangers Loom

November 10, 2010
According to the 2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey, sponsored by Intel and supported by the Medical Group Management Association, 33 percent of medical practices said
Read More

U.S. Bans Toner and Ink Cartridges on Passenger Planes, Extends Air Cargo Ban to Somalia

November 10, 2010
The United States announced an immediate ban on toner and ink cartridges over 16 ounces (453 grams) on passenger aircraft in both carry-on bags and checked bags on domestic and
Read More

Next Hacker Target? They Will Aim at Car Computer Systems; Hold on to Your Steering Wheel

November 10, 2010
The chief technology officer and vice president at integrator Northrop Grumman Information Systems said most cars contain 50, perhaps 100 or more tiny computers accessed through a diagnostic port that
Read More

A Call from Above: Flight Attendants Ask TSA to Fully Implement CrewPass

November 7, 2010
The Association of Flight Attendants-CWA (AFA-CWA) has once again called for the Transportation Security Administration (TSA) to fully implement CrewPass, an identification credential for aviation workers that promotes expedited screening
Read More
Previous 1 2 … 62 63 64 65 66 67 68 69 70 … 174 175 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing