• Home >
  • Back Issues >
  • Security Executive >
  • NOVEMBER/DECEMBER 2025
  • NOVEMBER/DECEMBER 2025

    Special Transportation Security issue

    More content from NOVEMBER/DECEMBER 2025

    Now is the time for mass transit agencies and operators to embrace compliance with the PCI PTS 6.x standard for transaction security.
    As agencies worldwide phase out magnetic stripe systems, PCI PTS 6. x-compliant ticket validators are emerging as the foundation for secure, frictionless fare collection and stronger...
    Dec. 17, 2025
    Credit: kokouu
    Over the past year, we’ve seen the aviation threat landscape escalate. High-profile breaches at airlines and vendors have exposed millions of passenger records.
    Airports, airlines, and air traffic networks are under siege from increasingly complex cyberattacks as industry leaders and regulators race to modernize legacy systems.
    Dec. 17, 2025
    While the most visible benefit of body-worn technology is deterrence, its value is also realized after incidents occur.
    Public confidence in mass transit hinges on how safe people feel. As body-worn cameras gain traction across transportation systems, agencies are discovering their value extends...
    Dec. 17, 2025
    Credit: Just_Super
    Increasingly, physical security system data is being integrated into IT SIEM and SOAR platforms, unifying physical and IT security information into a single operational picture. For instance, a notable Cloud-based security systems manufacturer now integrates camera and access-control data directly into enterprise SIEMs like Splunk and NetWitness.
    From SOCs to smart cameras, AI-driven systems are transforming security from a reactive to a predictive approach. This evolution unites physical and cyber domains, improves situational...
    Dec. 17, 2025
    For most organizations, it is not practical to transition directly from legacy Prox cards to mobile BLE or NFC credentials in one step. Various factors drive this fact today. They include credential cost, high employee turnover and legacy installed reader hardware issues.
    Tech giants have opened their NFC wallets, cloud platforms have matured, and enterprises are hungry for efficiency. Yet, the mobile credential revolution remains stuck in neutral...
    Dec. 17, 2025
    Credit: Andrii Dodonov
    Employees who bring their company into disrepute are often shown the door quickly. But what happens when it is the chief executive or a member of the C-suite whose actions put the organization itself under the microscope and risk its reputation?
    In industries built on trust and discipline, executive misbehavior can be catastrophic. These real-world cases reveal the cascading impact of C-suite scandals—and the steps companies...
    Dec. 17, 2025
    Credit: Shutter2U
    Despite modern security technology advancements, there has been a concerning escalation in the number of successful attacks exploiting basic attack vectors — the vectors security professionals have battled for decades to eliminate.
    Billions spent on cutting-edge cybersecurity, yet outdated patching and poor credential practices still leave the door open to breaches.
    Dec. 17, 2025
    Credit: Eyematrix
    The most effective security programs today are not ancillary but front and center, woven into the core of business strategy.
    Moving beyond theory, today’s enterprise security programs must connect insight to action. From executive alignment and adaptive planning to continuous improvement and data-driven...
    Dec. 17, 2025
    What Congress has modeled during this shutdown are the essential traits of lousy leadership.
    From unchecked egos to forgotten responsibilities, Washington’s ongoing shutdown offers a real-time lesson in how not to lead. The rest of us can, and must, do better.
    Dec. 17, 2025
    Credit: Cemile Bingol
    In the security profession, the rise of AI shouldn’t surprise anyone: we’ve been headed down that road for two decades.
    From the dotcom craze to the cloud and now artificial intelligence, every new IT obsession claims to revolutionize security. But behind the hype, the same old question remains...
    Dec. 17, 2025
    Credit: Nickbeer
    Fire doors, which are designed to contain flames and smoke during a structural fire, can also be used to secure areas during an active assailant event.
    From fire doors to secure corridors, new PASS guidance helps schools build safer learning environments by striking a balance between containment and first responder access.
    Dec. 17, 2025
    Credit: AscentXmedia
    gettyimages2204729783
    How your workplace must develop emergency plans for natural disasters.
    Dec. 17, 2025
    Credit: Rasi Bhadramani
    gettyimages1415739978
    Now that the quality of security surveillance video has improved, and camera deployments have expanded, there are video stakeholders outside of the Security function to whom video...
    Dec. 17, 2025
    Credit: MTStock Studio
    If today’s modern CISO has one defining trait, it’s their technical foundation. The new generation is practitioners first: engineers, analysts, and hands-on problem-solvers who understand what it takes to implement and maintain security tools.
    A new generation of cybersecurity leaders is rewriting the rules of vendor engagement — demanding transparency, technical depth, and real product performance over polished pitches...
    Oct. 15, 2025