Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Top Ten Reasons to Attend iSecurity

March 12, 2012, 10:00 am to 4:00 pm EST
January 19, 2012
Whether or not you have ever attended a virtual event, we've put together a list of reasons why you cannot afford miss iSecurity 2012.
Read More
International Crime Deja Vu All Over Again

Today's Cold War Evolves: Chinese Trade Secrets Theft, Russian Online Fraud Attacks

Internet, Email Spur Sophisticated Incidents, Some Supported by Other Countries
January 19, 2012

It is a new age Cold War going on as Chinese steal U.S. trade secrets and criminals from Russia commit frauds against Americans.


Read More
Sophisticated Operation Stole Millions

ID Theft and Bank Fraud Ring Advertised Its Services

Started with Real Social Security Numbers
January 11, 2012

Two individuals obtained credentials and then worked with others to open accounts and gain access to loans all illegally.


Read More
Government Buildings, Officials Targeted

Richmond, Va., City Hall Threat But Panic Alarms Don't Work

Experts, Law Enforcement Say to Expect More During Election Year
December 30, 2011

The Richmond, Virginia Mayor’s Office is looking into better security systems at city hall after a man allegedly stormed into City Council offices and panic alarms failed.


Read More
Yet Another Hack Attack from China

U.S. Chamber of Commerce Hacked, Allegedly from China

Evidence of a Link to the Chinese Government
December 21, 2011

During a significant period of time, the U.S. Chamber of Commerce computer network was hacked into by people using hundreds of Internet addresses but linked to a group in China. One goal was copying emails of chamber staffers who cover Asian businesses.


Read More
Your Talkback Is Appreciated

Wanted: Ideas on How to Minimize Risk of Copper Theft

Metal Theft Losses Growing
December 20, 2011

A Fargo theft with losses in the six figures shows the growing incidents of metal theft. Some also lead to loss of electric service to hospitals, neighborhoods and even whole cities.


Read More
High Priced Electronics Vulnerable Along the Supply Chain

Electronics Worth $2 Million Taken from Indiana Truck Stop

Incident Happened at a Truck Stop
December 20, 2011

An organized gang is suspected in a theft of a trailer full of a couple of million dollars worth of consumer oriented electronics which are easy to resell and hard to trace. There are vulnerabilities all along the supply chain, including truck rest stops.


Read More
Tampering Moves from ATMs to Supermarket Registers

Illegal Skimmers Discovered in Supermarkets on Self-check Registers

Delayed Notification May Have Increased Frauds
December 9, 2011

Found more often at ATMs and gas station checkouts, supermarkets in California discovered skimmers at self-checkout terminals. They delayed notifying customers because they thought they had prevented a security breach but more than a hundred customers reported thefts.


Read More
More Breaches, More Impact on Losses

Medical Data Breaches Soar, According to Study

The U.S. Healthcare Industry Facing More Threats
December 4, 2011

A survey of healthcare organizations found the average cost of data breaches to these organizations rose from $183,526 in 2010 to $2,243,700 in 2011.


Read More
Danger Inside of Clothes for Sale

Retail Security: Syringes Hidden in Clothes at Georgia Walmart

Incidents at Several Stores
December 4, 2011

Syringes discovered by shoppers all were recovered, appeared to be unused, but are troubling to loss prevention professionals.


Read More
Previous 1 2 … 48 49 50 51 52 53 54 55 56 … 173 174 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing