Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » risk management

Articles Tagged with ''risk management''

gun

How Active Shooter Technology can Enhance Emergency Response

john krumme
John Krumme
May 12, 2020
Active shooter technology has become a valuable tool that many security professionals are giving more consideration to, in light of the gun violence tragedies we see in our society on a regular basis. It’s important for security, facilities and IT directors to become familiar with active shooter technology to fully understand how it can be deployed, and how it benefits their company, employees and assets.
Read More
building

Can a Public Entrance also be Secure?

Glen Tracy
Glen Tracy
May 12, 2020
For business owners and property managers, public building security remains a universal challenge: How do you ensure the security of your staff and customers during hours of operation and protect your assets once regular business hours end? The conundrum that is security and safety in public spaces seems eternal, and the violence that fuels today’s headlines only exacerbates the urgency to find solutions to securing common building entrances.
Read More

How to Improve Efficiency, Reduce Fraud and Enable Intelligence in Credit Unions

matt tengwall
Matt Tengwall
May 12, 2020
When an incident or disaster occurs, security and fraud investigators go to work. They must be able to rely on innovative processes and tools that allow them to swiftly locate and analyze the information needed to determine the proper resolution or action. Credit unions need intuitive solutions that can be leveraged across multiple departments in a moment's notice to be more efficient and effective in today’s challenging environment.
Read More
Most Countries without Cybersecurity Strategy

Synopsys Study Shows 91% of Commercial Applications Contain Outdated or Abandoned Open Source Components

May 12, 2020
A new Synopsys report highlights trends and patterns in open source usage within commercial applications, and provides insights and recommendations to help organizations better manage open source risk from a security, license compliance, and operational perspective.
Read More
DHS

DHS Acting Secretary Wolf Announces New Homeland Security Advisory Council Members

May 11, 2020

Acting Secretary of Homeland Security Chad F. Wolf introduced seven new members to the Homeland Security Advisory Council (HSAC).


Read More
Billy-Spears

Billy Spears Named CISO at Alteryx

May 11, 2020

Alteryx Inc. announced that Billy Spears has joined the company in a new role as the Chief Information Security Officer (CISO).  

 


Read More

4 Cybersecurity Lessons from the Front Lines of Pandemic Preparation

gary symes
Gary Symes
May 8, 2020
Ten years ago, I helped create a national pandemic plan outlining how the U.K. would respond to a potential outbreak. While the exercise was largely theoretical, we are now seeing the need for these preparations in real time. Here are four key lessons from my time preparing for a pandemic.
Read More
financial- enews

The Building of a Cyber Resilient Financial Services Sector

Jason Harrell
Jason Harrell
May 7, 2020
As we enter the new decade, we stand reminded that technological innovation and cybersecurity threats continue to develop and evolve at an incredible pace. Firms must therefore continue to build the proper defenses to protect consumer confidential data and financial market integrity. Cyber threats have become one of the top threats to the financial services sector and the ability of firms to be resilient in the face of these threats is paramount. 
Read More

Is Passwordless Authentication the Future?

May 7, 2020
Each year on the first Thursday in May, World Password Day promotes better password habits.
Read More
Is Your Vendor Risk Management Program Working? - Security Magazine

What Elements add the Most Value to Security Leaders?

May 7, 2020
If you could choose three things that would enhance your security program, which three would you choose? In a new poll, the Security Executive Council  (SEC) wanted to find out what elements would add the most value to security leaders and their teams.
Read More
Previous 1 2 … 275 276 277 278 279 280 281 282 283 … 290 291 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing