Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

Harper College joins NIPAS

Harper College joins NIPAS mobile field force for coordinated response

July 14, 2021

The Harper College Police Department has joined the Northern Illinois Police Alarm System Mobile Field Force (NIPAS). 


Read More
Rhode Island College earns accreditation

RIC Campus Police achieve state accreditation

July 14, 2021

The police department of Rhode Island College is now one of 30-plus accredited police agencies in Rhode Island.


Read More
women in security

Women in security: A guiding force

Adam Brown
July 14, 2021

How often do you consider gravity? And the power of this invisible force to move oceans, hold planets in orbit, and quite literally, keep us all grounded. Now, how about women in technology? Another force of nature that, I think, deserves more visibility and recognition. Men haven’t cornered the market on technological genius, innovation, and invention. But too often, women have had to work all the harder not only to prove that fact, but also to be equally recognized for their extraordinary contributions.


Read More
DevOps-freepik

Cloud security should never be a developer issue

Shira Shamban
Shira Shamban
July 14, 2021
I dare to say this: “companies need to stop playing the game of pin the blame on the developer whenever a security vulnerability is discovered or exploited in applications.” Rather than pointing fingers at developers, organizations need to empower these professionals to help them build and expand their cloud-based initiatives without having to worry about security.
Read More
SEC0721-Edu-Feat-slide1_900px
Education & Training

COVID-19 brought all hands on deck: Why we need to keep it that way

Bruce McIndoe
Bruce McIndoe
July 14, 2021

Duty of Care spells out responsibilities an organization has for its people. This includes making the workplace safe, preventing risks to health, and ensuring safe working practices are set up and followed. There is a lot to deal with between these areas and the onus is on a variety of managers to ensure nothing falls between those cracks.


Read More
id-card-access-control-freepik

How visitor management, access control and security innovations are reshaping the look and feel of work in enterprises

stephen bishop
Stephen Bishop
July 13, 2021
Today, the world’s leading enterprises are going even further to unlock greater efficiencies and new and innovative capabilities well beyond the original security functions. The most sophisticated implementations of visitor management and access control are affecting many more stakeholders of the business – and it looks like it’s only the beginning.
Read More
security camera freepik

4 uses for smart cameras in fast-casual restaurants

Alex Harlass
Alex Harlass
July 13, 2021

One method fast-casual chains can use to simplify the automation and optimization of foodservice operations is by employing Artificial Intelligence (AI) as part of a video surveillance system. Smart security cameras combine the Internet of Things (IoT) and security cameras with AI analytics, helping operators automate monitoring and analyzing visitor and employee behavior.


Read More
SEC0721-Talk-Feat-slide1_900px
Security Talk

Fostering a healthy workplace environment in the aftermath of trauma

Maggie Shein
Maggie Shein
July 13, 2021

Security teams of all sectors face incidents of violence, anxiety, escalation and trauma during their careers. For a security leader, fostering a healthy workplace environment following trauma or helping managers and frontline security personnel navigate such incidents is particularly essential to healing, reducing turnover, and allowing everyone in the workplace to feel heard, respected and confident.


Read More
SEC0721-Tenant-Feat-slide1_900px
Integrated Solutions

Identity management for multi-tenant buildings

Identity and access management within a multi-tenant setting can be time-consuming, costly and risk-intensive without the right tools.
Brooke Grigsby
Brooke Grigsby
July 12, 2021

Trends in the industry are making identity management requirements in apartment and multi-tenant facilities all the more demanding. A new generation of solutions that offer dynamic identity provisioning on mobile devices offer a way forward — enabling universal, trackable access to all spaces for all users coming and going.


Read More
SEC0721-Pentesting-Feat-slide1_900px
Enterprise Services

Four ways to optimize your red team operations

If done right, red teams put an organization’s security controls, policies, response and training to the test using the tactics, techniques and procedures (TTPs) of real-world adversaries, providing value to any security program.
Brady Bloxham
Brady Bloxham
July 12, 2021

Red teams put an organization’s security controls, policies, response and training to the test using the tactics, techniques and procedures (TTPs) of real-world adversaries. It is an essential activity in any security program, but it only provides value if done right.


Read More
Previous 1 2 … 327 328 329 330 331 332 333 334 335 … 639 640 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing