This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • eMagazine
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • The Security Benchmark Report survey
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • Cybersecurity & Geopolitical Vodcast
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Keywords » layered security

Items Tagged with 'layered security'

ARTICLES

ATM bank security

How layered security can help prevent $150,000 losses from ATM attacks

Owing to the increasing frequency, diversity and sophistication of ATM attacks, banks must rethink and modernize security in order to better circumvent ATM crime and protect their bottom line
Matt tengwall
Matt Tengwall
February 23, 2021
Unfortunately, the unquestionable convenience and accessibility of ATMs is also the source of their greatest downfall. Being both unguarded and money-loaded, they are an obvious target for criminal activities and low-risk, high-reward theft opportunities for perpetrators. It is for this reason that 2020 experienced a drastic uptick in the number of ATM heists across the United States.
Read More
school-enews

How Security Professionals Can Help Create Positive School Memories

How Safety Measures Can Define a Generation
James Marcella
July 17, 2018
If we want today’s children to look back on their school days as more than just a time of “Run, Hide, Fight” training, lockdowns and lectures on the potential dangers of online behavior, school systems need to institute security measure that will create safer learning environments without making schools feel like prisons.
Read More
hacker

3 Strategies to Improve Your Enterprise’s Security Posture

Sam Kassoumeh
August 25, 2015
The job of the Chief Information Security Officer (CISO) has become challenging. As security has become a top-level concern for executive boards who are paying attention to the business impact of security, CISOs now have a seat at the table.
Read More
Defense in depth

Defense in Depth: A Layered Approach to Network Security

In light of all the headline-grabbing network security breaches in the last year it's understandable that enterprises might be on high alert to prevent their own organization from being thrust into the spotlight.
September 1, 2014

Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems.


Read More
mail_enews

4 Steps to Better Mail Screening and Ricin Detection

James Viscardi
May 28, 2013
Recent incidents of ricin being mailed to the White House and members of Congress are a chilling reminder that the mail system continues to be used by those wishing to do harm.
Read More
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • web_acs_secure_entry_900x550_no_text_2104__UWORAS30UT__
    Sponsored byAxis

    Solve your security challenges with a unified video & access control solution from Axis Communications

  • sponsored-content-BNP-covid__3J9FMQPY3I__
    Sponsored bySureView Operations

    How command centers are responding to COVID-19

Popular Stories

Allied officially able to complete G4S acquisition

G4S acquisition comes to an end; Allied now 7th largest employer in world

cyber security

CNA Financial hit by cyberattack

linkedin freepik

500m LinkedIn accounts leaked

messaging platforms freepik

Slack removes message invites in DM feature over harassment concerns

Workplace violence a problem

Workplace violence rises, particularly for nurses, frontline workers

4.22_SEC_SBS_360x184_customcontent

Events

April 22, 2021

Developing Mutually Beneficial Public/Private Partnerships in Security

This webinar will offer industry best practices to help your security team create or expand a sustainable program that aids in the fulfillment of your organization’s goals and objectives, while assisting your local agencies in fulfilling some of theirs as well — ultimately offering stronger security and response across both.
April 29, 2021

Emerging Technologies in Smart Security

This year promises to build on the technological and business model innovations of last year, refine their value propositions, and play a key part for organizations who are navigating through covid-19 and planning for a post-Covid era.
View All Submit An Event

Poll

Video Surveillance

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing