Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » security compliance

Articles Tagged with ''security compliance''

Organizations With Maturing Training Programs See Benefits with Compliance

July 28, 2017

Return on investment is greater for organizations with training programs deemed mature or advanced, helping them achieve risk mitigation and culture change, says a new report. 


Read More

Many Global Executives Don't Believe GDPR Compliance is Relevant to Their Business

July 10, 2017

Many global business decision makers are unaware of the implications of the forthcoming General Data Protection Regulation (GDPR), as well as other compliance regulations like PCI-DSS and ISO27001/2, with one in five admitting they do not know which regulations their organization is subject to.


Read More
whistleblower-cyber

Blowing the Whistle as a Cybersecurity Professional

Matthew LaGarde
Matthew LaGarde
Alexis Ronickher
Alexis Ronickher
May 31, 2017
Cybersecurity is a fact of business life, but employers are not always pleased when a cybersecurity professional reports a serious and expensive cyber deficiency. Often, instead of addressing the problem, they shoot the messenger and retaliate against the whistleblower.
Read More
europe-cyber-enews

The GDPR Transformation is Already Here

Tom Pendergast
May 4, 2017
The General Data Protection Regulation (GDPR) effective date is just about a year out, but already we can see the work companies are doing to achieve compliance having a significant impact on the privacy landscape here in the United States.
Read More
credit- enews

Payment Data Compliance: 12 Major Requirements of the PCI Data Security Standard

Tracy Reed
March 28, 2017
The Payment Card Industry Data Security Standard (PCI DSS) is the security standard for protecting payment card data. Navigating the requirements of the PCI DSS and implementing the technical security controls can be quite complicated.
Read More
iot-enews

Could a Device Labeling System Under the Trump Administration Lead to Better IoT Security?

Erik Kangas
March 14, 2017
Recent developments in the cybersecurity sphere read like a dystopian novel. The devices we use for convenience and entertainment in our homes are being taken over for malicious purposes by forces unknown.
Read More
Radiation Exposure Guidelines to Be Created

Radiation Exposure Guidelines to Be Created

Kylie Bull
March 1, 2017

Combatting drug trafficking at ports, screening passengers at airports, determining the age of immigrants who have lost their passports: these are among the areas where radiation is used for human imaging for non-medical purposes.


Read More
secrets

Cybersecurity: Vital to Legal and Technical Protection of Trade Secrets

Pamela Passman
February 14, 2017
Hardly a week goes by without a new hack or cyber breach being reported in the news, and companies are spending lot of time and attention in improving their IT security. But as companies set out to “raise their game” in protecting their confidential information from cyberattacks, it is important to understand and act on the fact that cybersecurity is not just a technology issue.
Read More
Lynn Mattice

What is a Best Practice, and Should You Deploy Them?

Mattice-2016-200px.jpg
Lynn Mattice
February 1, 2017

Almost everyone has heard the term “best practice.” While the term has become ubiquitous in recent years, the first record of its use was around 1927.


Read More
airport-enews

The Plain Facts about Airport Access Control Systems

Robert Laughlin
January 17, 2017
At the 2016 AAAE (American Association of Airport Executives) Airport Credentialing and Access Control Conference in Atlanta, Georgia, discussions centered around the rapidly evolving aviation security landscape, specifically with regard to renewed federal priorities on employee vetting and employee access control at airports.
Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing