<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Blog</title>
    <description>
      <![CDATA[Security Blog Topics]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2144-security-blog</link>
    <language>en-us</language>
    <item>
      <title>The Thin Purple Line initiative approved by the ASIS Global Board of Directors</title>
      <author></author>
      <description>
        <![CDATA[I was very pleased to learn the ASIS Global Board of Directors unanimously approved the “Thin Purple Line” initiative at their June 22, 2020 board meeting.]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/92751</guid>
      <pubDate>Mon, 06 Jul 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/92751-the-thin-purple-line-initiative-approved-by-the-asis-global-board-of-directors</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Default-images/Responsive-Defaults/Thin-Purple-Line.webp?t=1594060713" type="image/jpeg" length="47998"/>
    </item>
    <item>
      <title>Why every CIO should retire their VPNs</title>
      <author></author>
      <description>
        <![CDATA[<p style="margin-left:5.25pt;">Now is the time every CIO should retire their virtual private network (VPN) technology.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/92699</guid>
      <pubDate>Mon, 29 Jun 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/92699-why-every-cio-should-retire-their-vpns</link>
    </item>
    <item>
      <title>What Identity Governance is (Not)</title>
      <description>
        <![CDATA[<p>I often catch articles in my newsfeed that are supposedly about identity governance but upon reading the fine print, they invariably wind up being about access management.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/92412</guid>
      <pubDate>Mon, 18 May 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/92412-what-identity-governance-is-not</link>
    </item>
    <item>
      <title>Can the National Guard Protect America?</title>
      <author></author>
      <description>
        <![CDATA[<p>As COVID-19 continued to spread, some US states were swift to&nbsp;mobilize the United States National Guard<strong>. </strong>Will it become<strong> </strong>the savior America needs, even if it is not the one she wants?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/92180</guid>
      <pubDate>Sat, 18 Apr 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/92180-can-the-guard-protect-america</link>
    </item>
    <item>
      <title>Working with Government to Help Secure Our Elections</title>
      <description>
        <![CDATA[<p>You don&rsquo;t have to be a news junkie to notice one of the bigger stories the media is focusing on these days. Whether it&rsquo;s local, state or national races, election security has become a serious issue.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/92110</guid>
      <pubDate>Thu, 09 Apr 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/92110-working-with-government-to-help-secure-our-elections</link>
    </item>
    <item>
      <title>The Rise of the Chief Cybercrime Officer</title>
      <description>
        <![CDATA[<p>The TalkTalk data breach in 2015 was monumental for the cybersecurity industry. At the time, data breaches were hardly new, but this particular breach resulted in the government recommending that an officer should be appointed with day-to-day responsibility for protecting computer systems from a cyber attack.&nbsp;</p>

<p>&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/92092</guid>
      <pubDate>Wed, 08 Apr 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/92092-the-rise-of-the-chief-cybercrime-officer</link>
    </item>
    <item>
      <title>Coronavirus: Keeping Business Moving While Supporting Staff on the Road</title>
      <description>
        <![CDATA[<p>The COVID-19 virus may have started in China, but its effects are spreading across the globe &ndash; in various forms beyond the virus itself. In addition to the tragic loss of life it has already claimed, the virus&rsquo; impact on the business world has been far-reaching.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/91891</guid>
      <pubDate>Thu, 12 Mar 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/91891-coronavirus-keeping-business-moving-while-supporting-staff-on-the-road</link>
    </item>
    <item>
      <title>What Security Leaders Can Learn From the Coronavirus Threat</title>
      <description>
        <![CDATA[<p>A key role in corporate security leadership is in understanding global vulnerabilities as part of a shift that goes beyond traditional security concerns, in order to anticipate new risks to your organization.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/91831</guid>
      <pubDate>Tue, 03 Mar 2020 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/91831-what-security-leaders-can-learn-from-the-coronavirus-threat</link>
    </item>
    <item>
      <title>Are Your Security Systems Interoperable?</title>
      <description>
        <![CDATA[<p>Twenty-three years ago, when I worked with the Federal Protective Service policing federal facilities where security contract oversight was key, the General Services Administration and U.S. Justice Department designed systems that complimented each other to provide concentric layers of protection against unlawful entry and other threats.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/91808</guid>
      <pubDate>Fri, 28 Feb 2020 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/91808-are-your-security-systems-interoperable</link>
    </item>
    <item>
      <title>The Value of Integrity, and What it Means for Security</title>
      <author></author>
      <description>
        <![CDATA[<p>The word &lsquo;integrity&rsquo; comes from the Latin &lsquo;integer,&rsquo; meaning complete, or whole (the same source as the mathematical term for a whole number). A person with integrity, then, is someone who has a fully developed moral character.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/91174</guid>
      <pubDate>Tue, 29 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/91174-the-value-of-integrity-and-what-it-means-for-security</link>
    </item>
    <item>
      <title>Physical Security Sector’s Mission to Hire Veterans</title>
      <author></author>
      <description>
        <![CDATA[<p>As CEO of Allied Universal, I believe that veterans, service members and reservists are unsung heroes who serve, secure and care for the people and communities in every corner of our world.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/91060</guid>
      <pubDate>Tue, 08 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/91060-physical-security-sectors-mission-to-hire-veterans</link>
    </item>
    <item>
      <title>What the Government Can (and Cannot) Do About Mass Shootings</title>
      <author></author>
      <description>
        <![CDATA[<p>Mass shootings, like the one that occurred at the Walmart Supercenter on the east side of El Paso, Texas on August 3, 2019, are sadly becoming more common.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/90889</guid>
      <pubDate>Sun, 08 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/90889-what-the-government-can-and-cannot-do-about-mass-shooting</link>
    </item>
    <item>
      <title>Cluster-in-Chief</title>
      <author></author>
      <description>
        <![CDATA[<p>Mass violence, primarily shootings, is growing and can only continue to do so, and we have a professional obligation to analyze where the failures are and to take corrective action.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/90708</guid>
      <pubDate>Tue, 13 Aug 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/90708-cluster-in-chief</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Default-images/Responsive-Defaults/police1-900px.webp?t=1472739459" type="image/jpeg" length="117556"/>
    </item>
    <item>
      <title>Family Affiliated Terrorism: Fathers and Sons</title>
      <author>dc-alexander@wiu.edu (Dean C. Alexander)</author>
      <description>
        <![CDATA[<p>Patriarchs have a strong influence on the level of radicalization and recruitment of family members.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/89964</guid>
      <pubDate>Mon, 18 Mar 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/89964-family-affiliated-terrorism-fathers-and-sons</link>
    </item>
    <item>
      <title>Now That You Have a Plan, Are You Testing It?</title>
      <description>
        <![CDATA[<p>As someone who has been engaged by consulting clients and full-time employers to conduct threat assessments and write security and emergency preparedness plans, I am often left puzzled by how many organizations go to great lengths to assess their vulnerabilities and create plans to address them, but almost never test their ongoing effectiveness.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/89965</guid>
      <pubDate>Mon, 11 Mar 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/89965-now-that-you-have-a-plan-are-you-testing-it</link>
    </item>
    <item>
      <title>Family Bonds: For Love and Terrorism</title>
      <author>dc-alexander@wiu.edu (Dean C. Alexander)</author>
      <description>
        <![CDATA[<p>Last week President Donald Trump called on European countries to take 800 ISIS members that are in U.S. custody in Syria or &ldquo;we will be forced to release them.&rdquo;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/89889</guid>
      <pubDate>Mon, 25 Feb 2019 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/89889-family-bonds-for-love-and-terrorism</link>
    </item>
    <item>
      <title>Reducing False Alarms with Audio as a Secondary Verification Source</title>
      <author></author>
      <description>
        <![CDATA[<p>We must progressively act towards capturing sound, viewing audio as an equally essential component as video.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/89812</guid>
      <pubDate>Tue, 05 Feb 2019 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/89812-reducing-false-alarms-with-audio-as-a-secondary-verification-source</link>
    </item>
    <item>
      <title>Best Practices for Security Professionals at Home and at Work</title>
      <author></author>
      <description>
        <![CDATA[<p>Security professionals in modern America spend virtually every working moment developing, fine tuning and implementing strategies that will offset, prevent and mitigate the possibilities of violence.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/23/post/89125</guid>
      <pubDate>Wed, 13 Jun 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/23-break-in-prevention-blog/post/89125-best-practices-for-security-professionals-at-home-and-at-work</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Default-images/Responsive-Defaults/911-1-900px.webp?t=1472739458" type="image/jpeg" length="70104"/>
    </item>
    <item>
      <title>Active Shooter at Stoneman Douglas– A Survivor’s Experience and Potential Implications to School Safety</title>
      <author></author>
      <description>
        <![CDATA[I just came out of a meeting addressing campus lockdowns and mass notification when my phone started buzzing. The Broward County Sheriff Department’s Alertify message stared me in the face – Active Shooter at my daughter’s school.]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/88800</guid>
      <pubDate>Thu, 08 Mar 2018 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/88800-active-shooter-at-stoneman-douglas-a-survivors-experience-and-potential-implications-to-school-safety</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Default-images/Responsive-Defaults/edu7-900px.webp?t=1472739459" type="image/jpeg" length="122896"/>
    </item>
    <item>
      <title>Is Your School Vulnerable to an Attack?</title>
      <description>
        <![CDATA[<p>With the unfortunate shooting attack at Marjory Stoneman Douglas High School in Parkland, it was South Florida&rsquo;s turn to witness the horrors of such an attack.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/88798</guid>
      <pubDate>Wed, 07 Mar 2018 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/88798-is-your-school-vulnerable-to-an-attack</link>
    </item>
  </channel>
</rss>
