Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » IT management

Articles Tagged with ''IT management''

IV stand in hospital room

Encrypted pager use on the rise in healthcare since 2022

Security Staff
October 12, 2023

Healthcare communication methods were analyzed in a recent report by Spok Holdings, including budget constraints and security concerns.


Read More
computer next to phone on red stand

Cloud adoption is driving up IT budgets

Security Staff
September 21, 2023

The impact of cloud adoption on IT teams was analyzed in a report, finding that cloud platforms took up significant portions of IT budgets.


Read More
5 Minutes With logo-Riley
5 Minutes With

Overcoming challenges in a changing security industry

Rachelle Blair-Frasier, Editor in Chief
Rachelle Blair-Frasier
August 16, 2023

The state of the physical security industry is changing. In this installment of 5 Minutes With, we talk to Steve Riley, Global Security Technology Lead at IBM Corporate Security.


Read More
using credit card to pay online

The rise in e-commerce forces retailers to adjust IT procedures

Security Staff
August 14, 2023

The pandemic-induced rise in e-commerce has led retailers to adjust their IT departments, according to a recent report by Information Services Group.


Read More
employees working at laptops

40% of IT workers admit to working 50+ hour weeks consecutively

Security Staff
June 22, 2023

IT leaders were surveyed by Kaseya about IT operations and management. Forty-five percent of respondents prioritize the improvement of IT security.


Read More
someone in headphones working at computer

36% of government IT does not have a documented disaster recovery plan

Security Staff
June 21, 2023

The experience and habits of IT departments when it comes to ransomware and data recovery were analyzed in a recent report by Arcserve. 


Read More
ChatGPT on computer

Rushing into generative AI is risky: How to protect data

Zabriskie headshot
Dale “Dr. Z” Zabriskie
June 13, 2023

There’s no doubt that generative AI will be a useful tool for businesses, but it requires careful implementation.


Read More
blue and white vertical lights

Security leaders plan for changing IT roles

Security Staff
June 5, 2023

IT professionals find themselves in hybrid roles that combine traditional development with tasks formerly associated with operations professionals.


Read More
sprouting plants on farm

IT-ISAC launches food and agriculture analysis center

Security Staff
May 25, 2023

The food and agriculture special interest group of the Information Technology-Information Sharing and Analysis Center is now its own analysis center.


Read More
pink digital lines on black screen

32% of organizations say they're effective at mitigating cyber threats

Security Staff
May 17, 2023

A report reveals an increase in cyberattacks and evolving threat landscape are resulting in more organizations building long-term cyber resilience.


Read More
Previous 1 2 3 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Code

Security Leaders Discuss the Marquis Data Breach

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing