Redrawing the line of perimeter protection

Redrawing the line of perimeter protection

The concept of creating a barrier or ring around an environment for safeguarding can be traced back to ancient civilizations, where they had to protect themselves from marauding armies or spies infiltrating their settlements. Today, organizations are facing ever-evolving threats from outside and within their boundaries from terrorism, state-sponsored cyber-attacks, industrial espionage, politically driven activism — the list goes on. What’s more, the tools at the disposal of bad actors are more powerful than ever,…

Read More

Mobile vehicle barriers: Long-term security solution for temporary events

Mobile vehicle barriers: Long-term security solution for temporary events

At around 4:40 p.m. on November 21, 2021, Darrell E. Brooks Jr. shocked the nation when he drove a red SUV through an annual Christmas parade in Waukesha, Wisconsin. The incident was over almost as quickly as it began, leaving 6 dead and dozens injured. Why Brooks did this is still largely unknown, however, witnesses felt this was “a direct intent to hit as many parade participants as possible.”  Unfortunately, intentional vehicle ramming incidents at…

Read More

AMA: Security Architect Edition — Joel Dunning

AMA: Security Architect Edition — Joel Dunning

AMA: Security Architect Edition — Joel Dunning | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Spotlight on security technology at GSX 2022

Spotlight on security technology at GSX 2022

Spotlight on security technology at GSX 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Securing the Perimeter in Manufacturing and Distribution

Securing the Perimeter in Manufacturing and Distribution

Securing the Perimeter in Manufacturing and Distribution | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Around the clock protection: How steel fencing secures perimeters

Around the clock protection: How steel fencing secures perimeters

Around the clock protection: How steel fencing secures perimeters | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

3 reasons why cybersecurity must be people-centric

3 reasons why cybersecurity must be people-centric

3 reasons why cybersecurity must be people-centric | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Incident management system helps secure Prague Airport

Incident management system helps secure Prague Airport

<!– Incident management system helps secure Prague Airport | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Defending your perimeter: Taking an intelligent, layered approach to security

Defending your perimeter: Taking an intelligent, layered approach to security

Defending your perimeter: Taking an intelligent, layered approach to security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Security risk management within the nonprofit sector

Security risk management within the nonprofit sector

Security risk management within the nonprofit sector | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3