Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » security management

Articles Tagged with ''security management''

Video camera on top of building with cloudy sky behind it

Video analytics capabilities drive new opportunities

Florian Matusek
October 4, 2024

Organizations are deploying more cameras than ever, increasing the amount of available footage to help security teams address incidents.


Read More
Computer with rows of multicolor text on black screen

Calling for backup: The importance of disaster recovery

Brent Torre
August 13, 2024

The number one mistake a business could make is assuming that they won’t be the victim of a ransomware attack.


Read More
Security's Women in Security 2024
Special Report

Security's Women in Security 2024

This year's awardees are devoted change-makers in their organizations and the security industry as a whole.
Rachelle Blair-Frasier, Editor in Chief
Rachelle Blair-Frasier
July 2, 2024

This year's awardees are devoted change-makers in their organizations and the security industry as a whole.


Read More
Colorful text on black screen

The modern security operations center: Shaping the future of SOCs

William Wetherill
June 4, 2024

In the dynamic world of cybersecurity, the security operations center (SOC) is the nerve center of an organization’s defense strategy.


Read More
Job search
Career Intelligence

Online security job leads

Tips for security professionals searching through job boards.
Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
May 9, 2024

Security job seekers have many ways to find job leads. For the sheer volume of apparently potential opportunities, though, it is hard to ignore job boards.


Read More
Office with gray walls and a white desk

88% of respondents will focus security investments on cloud security

Security Staff
April 23, 2024

According to a recent cybersecurity priorities report, security analysts maintain that up to 57% of their daily tasks could be automated.


Read More
Video cameras on wall with people looking at them

Hybrid-cloud: The best of both worlds

Laurent Villeneuve
April 19, 2024

No matter how many systems are running on local devices or connected to the cloud, organizations can bring them all back to a central head end. 


Read More
Women being interviewed by panel
Career Intelligence

Be ready to quickly find a security job

Steps to help ensure a solid backup plan in place should security practitioners need one.
Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
April 11, 2024

Steps to help ensure a solid backup plan is in place for when security practitioners need to find a new security job quickly.


Read More
Two women working together on couch

International Women’s Day 2024: Closing the gender gap in security

Taelor Sutherland, Associate Editor
Taelor Sutherland
March 8, 2024

This International Women’s Day, female security leaders share their career paths and offer advice to women looking to enter the industry. 


Read More
Desk covered in work supplies

Kent Goodrow appointed Chief Information Security Officer at Systems Engineering

Security Staff
February 14, 2024

Kent Goodrow has been appointed Chief Information Security Officer at Systems Engineering. Goodrow is pursuing a Master's in Cybersecurity Management.


Read More
Previous 1 2 3 4 5 6 7 8 9 … 30 31 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing