Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • Annual Guarding Report
    • The Security Leadership Issue
    • Women in Security
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity » Cybersecurity News

Cybersecurity News
Cybersecurity News RSS Feed RSS

Openness article feature

Openness Opens Doors with IT and Physical Security

zalud-2016-200px.jpg
Bill Zalud
April 1, 2011

Warning: This article does not contain talk of convergence, silos, fusion, tipping points, disruptive technologies, a place at the table and all the other new-age, highfalutin mumbo-jumbo that too often says more about the speaker than the concerns of the listener.


Read More
Web Exclusive Logo

Proposed Puerto Rican Scanning Regulation Will Result in Increased Costs and Supply Chain Delays

Douglas Heffner
March 8, 2011

In December 2010, the Puerto Rico Ports Authority (PRPA) issued a proposed regulation that would require all inbound cargo containers, regardless of whether the container was shipped from a company located in the United States or from a company located in a foreign country, to be scanned for contraband.  If enacted, the proposed scanning regulation would increase costs and result in supply chain delays.  The cost would range from $58 to $70 per container (depending on the size of the container).  


Read More
Security Director Primer feature image

Crime Pattern Analysis and the Security Director: A Primer

Steve W. Ballantyne
March 1, 2011

Crime pattern analysis (CPA) is a generic term that covers a wide range of approaches and techniques in the field of crime analysis. CPA looks for crime patterns and trends. Some of these methods and theories used in crime pattern analysis include criminology theories such as Routine Activity Theory, Rational Choice Theory, Repeat Victimization and Crime Pattern Analysis.


Read More
Web Exclusive Logo

Working in the Cloud: Critical Security Questions to ask any SaaS provider

Tony Schmitz
February 22, 2011
As the number of solutions available in the cloud grows and an increasing number of organizations turn to SaaS-based solutions to improve operations while reducing their costs, an increasing amount of sensitive information is being communicated via the Internet. IT professionals are rightly concerned with uptime, privacy risks and overall security.
Read More
Security Newswire

Data Loss Prevention – Two Approaches to Save Corporate Reputation and Protect the Bottom Line

Todd Feinman
February 8, 2011
Every two seconds someone becomes a victim of identity theft in America and last year, identity theft totals amounted to $100 billion. Even though many organizations are expanding security efforts, the number of identity theft incidents is still increasing as thieves continue to change their tact on a daily basis.
Read More

Security: “What’s IT got to do with it?”

Dr. Bob Banerjee
January 25, 2011
You can substitute any threat or compliance challenge, for any industry, and come to the same conclusion. With the advent of IP-based security and the widespread use of non-proprietary servers and storage, solving problems through security is no longer simply the domain of the Security group. Because IT has subject matter expertise, and often holds the budget reins, IT now has a head seat at the table.
Read More
SEC01110_MyTurn

The Role of the Private Sector in Fusion Centers

January 1, 2011
From newspapers and television broadcasts to cell phones, computers and radios, our daily routine is surrounded and bombarded with all forms of communications, and we may feel informed.
Read More

Identity Theft, Financial Security and Best Practices in 2011

Roger Thompson
December 14, 2010
There are three significant issues facing the online security industry in 2011. None of them are particularly new, but they are approaching crisis point.
Read More

Nothing Is Clearer Than The Cloud

Mark McCourt
September 28, 2010
It is rare and wonderful when a new infrastructure platform unites with applications to create a truly dynamic technology solution that provides significant leverage to both the cost/benefit equation of
Read More

Whose Email Is It Anyway?

zalud-2016-200px.jpg
Bill Zalud
July 1, 2010
Some policies, procedures and measures can be counterproductive when it comes to protecting emails, voicemails and communicating of large data files, contends Steven Brower of the law firm Buchalter Nemer.
Read More
Previous 1 2 … 609 610 611 612 613 614 615 616 617 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Lowes
    Sponsored byAxis

    Modernizing Retail Technology Operations to Improve Business Efficiency

  • Threat management
    Sponsored bySeerist

    Polycrises are Exhausting Your Security Team: Tips to Navigate the Challenges

  • image of electric security gate by AMAROK
    Sponsored byAMAROK

    Redefining Security: Proactive Measures Transform Industrial Protection

Popular Stories

Coding on monitor

Windows users targeted with zero-day attacks via Internet Explorer

Empty hospital room

McLaren Health Care experienced a criminal cyber attack

Person in hoodie on laptop

North Korean hacker tries to access KnowBe4, security leaders react

Two cellphones

Security leaders respond to the AT&T data breach

Doctor holding stethoscope

Security leaders respond to HealthEquity data breach

Profiles In Excellence

Security Magazine is looking to feature individuals that are showcasing excellence within the security industry!

Events

March 14, 2024

Balancing Act: Navigating Security Tech in Nonprofit Entertainment Sectors

ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security. 

March 19, 2024

Enhance Digital Forensics with Streamlined Analysis and In-Depth Investigations

ON DEMAND: Explore the latest developments in digital forensics with an in-depth look at FTK 8.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Secutiy Podcasts

Where security and risk professionals stay up to date on the latest issues affecting the enterprise.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey And Sample
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2024. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing