Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

Ronald McDonald house

Ronald McDonald House adds cloud video surveillance

Security Staff
July 12, 2022

The Ronald McDonald House Charities of Central Texas implemented a cloud video surveillance system from Eagle Eye Networks to improve operational efficiencies. Learn more in this case study.


Read More
Secureworks_CTO.jpg

Michael Aiello named Chief Technology Officer at Secureworks

Security Staff
July 12, 2022

Michael Aiello has been named Chief Technology Officer (CTO) at Secureworks, a cybersecurity company.


Read More
construction worker

OSHA implements weekend safety checks to mitigate fall hazards

Security Staff
July 12, 2022

The Occupational Safety and Health Administration (OSHA)'s "Weekend Work" initiative will conduct construction site safety inspections on weekends, when security supervision may be more lax.


Read More
industrial-iot-freepik1170x.jpg

IIoT, OT cybersecurity challenges: Investments and breaches

Security Staff
July 12, 2022

Barracuda research finds organizations are struggling to protect operational technology and getting breached as a result.



Read More
windmills energy

Dept of Energy releases C2M2 version 2.1 for energy cybersecurity

Security Staff
July 12, 2022

The U.S. Department of Energy (DOE) Office of Cybersecurity, Energy Security and Emergency Response (CESER) has released version 2.1 of the Cybersecurity Capability Maturity Model (C2M2).


Read More
smart-city-freepik1170x658b6.jpg

Big data and smart cities: How to battle the pandemic while preserving privacy

Ivan Kot
July 12, 2022

Smart city technologies and urban big data produce data privacy concerns. For any data-driven smart city project to be successful, it must communicate its value and data safety to its primary stakeholders — the citizens. 


Read More
digital-forensics-freepik1170x658.jpg

Digital forensics technology can help support cyber investigations, incident response

Harsh Behl
July 12, 2022

For corporations who can’t fill the vital cybersecurity and forensic positions, the highest cost lies in timeliness: they can’t afford delays in responding to incidents or breaches. Digital forensic tools with automation capabilities may be the answer.


Read More
cyber security lock

Enterprise incident response plans must improve

Robert R. Ackerman Jr.
Robert R. Ackerman Jr.
July 12, 2022

As cyberattack methods evolve, so too must enterprise incident response plans. How an organization recovers from a data breach is critical to their future business success.


Read More
daryl-green-headshot-copy.png

Daryl Green named AVP of Public Safety, Chief of Police at University of Alabama at Birmingham

Security Staff
July 11, 2022

In his new role at the University of Alabama at Birmingham, Daryl Green will oversee UAB Police and Public Safety’s team of 204 law enforcement, security, and emergency management personnel.


Read More
quantum-comp-freepik1170x658.jpg

NIST reveals 4 quantum-resistant cryptographic algorithms to prevent future attacks

Security Staff
July 11, 2022

Four selected encryption algorithms will become part of NIST’s post-quantum cryptographic standard, expected to be finalized in about two years.


Read More
Previous 1 2 … 174 175 176 177 178 179 180 181 182 … 639 640 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing