Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

Mark Gorman

Mark Gorman Named EVP and Chief Operating Officer of the National Association of Cannabis Businesses

March 27, 2020

The National Association of Cannabis Businesses (NACB) announced the appointment of Mark Gorman as its new Executive Vice President and Chief Operating Officer.


Read More
SEC1118-talk-Feat-slide1_900px

The Top 10 Employer Cybersecurity Concerns For Employees Regarding Remote Work

saad gul
Saad Gul
mike slipsky
Mike Slipsky
March 26, 2020

While increasingly common even before the coronavirus, remote work brings its own unique set of cybersecurity challenges. Here are the ten most common pitfalls and the recommended solutions.


Read More
SEC0320-edu-feat-slide1_900px

Health, Wellness and Physical Fitness and Your Security Officers

Are Your Security Officers Fit for Duty?
Andy Tufano
Andy Tufano
March 25, 2020

It may well be that the primary reason that security officers have historically struggled to achieve high levels of organizational and vocational relevance and performance is based solely on their generalized lack of health, wellness and physical fitness.


Read More
coronavirus

Simple Security Steps for Employees and Employers – Establishing Secure and Flexible Remote Work Environments

carmen fontana
Carmen Fontana
March 25, 2020
As companies find themselves suddenly shifting to remote work due to the COVID-19 (coronavirus) outbreak, many employees are working from home for the first time. While not ideal from a security standpoint, there are simple steps you, and your employer, can quickly take to better secure your new working environment.
Read More
SEC0219-pen-Feat-slide1_900px

11 Types of Spoofing Attacks Every Security Professional Should Know About

david-balaban
David Balaban
March 24, 2020

The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.


Read More
patrick fiel 5 mins with

5 Minutes with Patrick Fiel on Security Practices during Coronavirus Outbreak

March 24, 2020

Security magazine recently spoke with Patrick V. Fiel Sr., a security expert, on some of the best practices during this coronavirus crisis.


Read More
leadership

Leading a Company Through Crisis: Communication, Support and Technical Considerations

Craig Hinkley
Craig Hinkley
March 24, 2020

As COVID-19 has prompted an unprecedented number of companies and government agencies worldwide to suddenly shift to a remote-work model, uncertainties abound. 


Read More
password

What is Two-Factor Authentication? The Tip of the Security Spear

Marty Puranik
March 23, 2020
How can the modern office environment improve their operational strategy to help bolster the security of data and help employees brush up on better cybersecurity strategies? One primary method that is simple and often overlooked is two-factor authentication. 
Read More
5 Minutes with Jim Sawyer

5 Minutes with Jim Sawyer of Seattle Children's Hospital

March 23, 2020

The state of Washington is one of the most affected states in the US by the coronvirus. Here we speak with Jim Sawyer, Director of Security Services at Seattle Children's Hospital, and learn how security and medical staff are handling the coronavirus epidemic.


Read More
coronavirus - traction guest

Ensuring Workplace Safety for Essential Services during the Coronavirus Outbreak

keith metcalfe
Keith Metcalfe
March 23, 2020
The domino effect of the coronavirus outbreak has severely impacted every facet of our everyday life, including how we work.
Read More
Previous 1 2 … 470 471 472 473 474 475 476 477 478 … 636 637 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Rendered heart monitors

Cybersecurity Stagnation in Healthcare: The Hidden Financial Costs

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing