This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Keywords » Internet of Things

Items Tagged with 'Internet of Things'

ARTICLES

Internet of Things

Companies Walking a Fine Line Between Innovation and Cybersecurity

September 17, 2019
No Comments

Companies are working to balance their desire for new innovations with their need for strong cyber-defenses, a new report from CompTIA.


Read More
smartcity

Futurizing IoT Security for Smart Cities

David_close
David Close
August 23, 2019
No Comments

Many view smart cities as the future of urban living, promising to boost the efficiency and effectiveness of city services and the quality of life for residents while helping cities keep pace with growth and the associated pressure on aging infrastructures.


Read More
Internet of Things

Transformative Leadership: The Past Can Predict The Future

Dan-dunkel-300x300
Dan Dunkel
July 17, 2019
No Comments

Transformation is defined as: “(noun) a change in form, appearance, nature or character.” Today, the physical security industry is faced with the fact that digital transformation has redefined business risk.


Read More
cyber network

Tipping the Scale for Effective Cybersecurity

Dustin-hillard_lg
Dustin Hillard
May 8, 2019
No Comments
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.
Read More
globe- enews

Cybersecurity Trends To Watch For in 2019

Vijay-bharti---ciso-happiest-minds
Vijay Bharti
April 10, 2019
No Comments
Multiple cyber-attacks and compromise of personal information of millions of people globally show that the complexity and intensity of cybersecurity attacks are on the rise, and it could have broader political and economic ramifications. As cybercrimes become more lucrative and cybercriminals become smarter, cybersecurity too will have to be intelligence driven, enabling a swift response to the advanced attacks.
Read More
Office building

Mobile and IoT Devices: Enabling Remote Access

Steven-turney-headshot
Steven Turney
February 21, 2019
No Comments

As many industries adopt IoT solutions for increased security, reduced costs and new opportunities, the buildings industry is looking to do the same by incorporating IoT and mobile functionality into a range of facilities, including around building security systems.


Read More
smartcity

How to Lay the Groundwork for Protecting Smart City Connectivity

Kevin Taylor
February 12, 2019
No Comments
Most people in the physical security industry are familiar with the 5 Ds: deter, detect, delay, deny and defend. These principles seem universally applicable for facility or asset protection use cases. But what principles should we apply in areas of open public access?
Read More
data-center

Data Centers: Protecting the First Line of Defense

John-distelzweig-security-magazine
John Distelzweig
January 15, 2019
No Comments
There are approximately three million data centers scattered across the United States. These facilities house organizations’ networked computer servers that collect, store, process and provide access to large amounts of data for millions of users each day. Today, these server farms have become critical to the essential functioning of government entities, financial institutions, large enterprises, social network organizations and smart cities.
Read More
meeting1-900px.jpg

Study Says Manufacturers Struggle with IoT and Finding Skilled Cybersecurity Staff

January 8, 2019
No Comments

Though the manufacturing sector does not attract the sheer volume of total cyberattacks as other areas of the economy, research has shown that coordinated cyber espionage targets manufacturing more than any other sector.


Read More
Cybersecurity Leadership Images

Threats to Look Out for in 2019 – How to Protect Mid-Tier Enterprises from Tomorrow’s Known and Unknown Cyberattacks

Dmitriy-ayrapetov-hs
Dmitriy Ayrapetov
December 24, 2018
No Comments

This year was laden with cybersecurity challenges pertaining to “opportunistic attackers” and attempts to compromise individuals’ computers for credentials and financial information harvesting.


Read More
More Articles Tagged with 'Internet of Things'
Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cybersecurity-blog

European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing