Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » security career

Articles Tagged with ''security career''

finger-cyberenews

Who in an Organization is Responsible for a Data Breach?

Cindy Kaplan
August 2, 2018
While casting blame for your local team’s loss on Sunday may make for great sports talk, asserting blame for your company’s data breach is an uncomfortable exercise of self-effacement. It is a matter that many company leaders are struggling with. According to a recent survey conducted by the Ponemon Institute, 67% of CISOs expect a data breach or cyberattack in 2018.
Read More
SEC0818-cover-feat-slide1_900px

In a Day’s Work: The Fight to End Workplace Violence

How are Cox Enterprises and others effectively reducing the risk of workplace violence in their organizations?
diane-2016-200.jpg
Diane Ritchey
August 2, 2018

"Acts of violence such as active shooters aren’t random,” says A. Benjamin Mannes. “From events such as Adam Lanza and Newtown, Nikolas Cruz and Marjory Stoneman Douglas High School, Jin Yu Park at Virginia Tech, and even Jared Loughner, who shot Congresswoman Gabby Giffords, all were planned.”


Read More
SEC0818-career-feat-slide1_900p

Personal Branding and Your Career, Part 2

August 1, 2018

In July’s column, I provided an overview of the concept of personal branding and why it is relevant to security professionals looking to further both their reputation and marketability. This month I want to expand on the topic by addressing specific steps you can take to better identify your individual brand.


Read More
driver_enews

How to Choose a Security-Trained Driver (And Why You Need One)

Donald D. Purdy Jr.
July 31, 2018
Up to 85 percent of attacks on principals happen in or around a vehicle, says Greg Threatt of Threatt Protection Services in a recent Security article, What to Look for in Travel Security and Executive Protection Services. Threatt concludes that having a security-trained driver is paramount to a successful executive protection program.
Read More
ncs4-lifetime-enews

Sports Security Leaders Share Resilience Strategies at NCS4 Conference

July 17, 2018
Hundreds of sports security professionals met last week in Louisville, Kentucky, for the 9th Annual NCS4 Conference, where they tested new technology, networked, discussed situational awareness techniques and honored industry professionals who go above and beyond to ensure their venues and events stay safe.
Read More

Webinar: How to Cope with Reduction in Force and Corporate Downsizing

July 13, 2018

Is your program facing a shrinking security force or a downturn in the market? In our next Solutions by Sector webinar on July 26, Andrew Baer, head of global security for Weatherford International, will outline how to cope.


Read More
airport1-900px.jpg

TSA Recruiting More Security Officers

July 9, 2018

As the summer travel season is in full swing, the Transportation Security Administration is looking to hire thousands more security officers.


Read More
Global Security Exchange Doubles Down on Networking

Global Security Exchange Doubles Down on Networking

July 1, 2018

From September 23-27, ASIS International is bringing its world-class networking events to Las Vegas for Global Security Exchange (GSX), formerly the Annual Seminar and Exhibits. ASIS is pulling out all the stops, offering invaluable opportunities to forge new connections and build existing relationships at the industry’s premier networking events.


Read More
SEC0718-edu-feat-slide1_900px

How Intelligence Analysis Can Drive Corporate ROI

Daniil Davydoff
Daniil Davydoff
July 1, 2018

Go to any security conference and you’ll be quick to discover that getting “buy-in” and maintaining a “seat at the table” are still the predominant concerns among security leaders. After all, unlike other business units that bring in revenue directly, corporate security must show that it is not merely a cost center but a cost- (and sometimes a life-) saver.


Read More
The Corner Office - july 2018

The Best Technology Ever Created

Phil Aronson
Phil Aronson
July 1, 2018

I love technology. My college degree is in math. I enjoy solving problems using technology. I love its disruptive nature. It can force us to rethink the way we do things. It changes us; how we think of ourselves, our families, our work and our society. It provides hope to the crippled, opportunities for the poor and disenfranchised, and healing for our environment. Its potential is a two-sided blade. It can harm us or help us. It can be used for good or evil.


Read More
Previous 1 2 … 24 25 26 27 28 29 30 31 32 … 39 40 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing