Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

cyber security freepik

How to prioritize patching in the exploit storm

Derek Manky
Derek Manky
May 12, 2021

COVID made “flatten the curve” a household phrase in 2020, but did you know the concept also applies to vulnerability exploits? It turns out that what’s past is prologue in exploit trends. By tracking which attacks are being exploited the most, organizations discover important information to help proactively determine their vulnerability and risk. But it is also important to track attacks where activity has increased the most within a specified timeframe. It only takes one critical exploit to cause significant damage and, once inside the network, the attacker will need to move laterally and probably deploy additional exploits. That’s why understanding which exploits have the greatest likelihood of arriving on the network’s doorstep helps organizations prioritize patch management and risk assessment. This remains top of mind as cyber adversaries continue to maximize vulnerabilities, as we have recently seen with DearCry ransomware, for example.


Read More
SEC0521-ESRM_Feat-slide1_900px
Enterprise Services

Putting your faith in Enterprise Security Risk Management (ESRM)

With enterprise security risk management, organizations should consider the risks versus potential impact to dictate when and how often they assess risk. What does that mean for your organization?
Michael Gips
Michael Gips
Will Anderson
Will Anderson
May 12, 2021

Enterprise security risk management is an approach where organizations should consider the risks versus potential impact in order to dictate when and how often they assess risk. The ESRM approach to risk management and security is meant to keep a security program agile and responsive. Learn about the keys needed to implement an efficient ESRM program.


Read More
SEC0521-Covid-ECRMC_Feat-slide1_900px

El Centro Regional Medical Center: Ensuring in-patient care during COVID-19

The Security Department at the El Centro Regional Medical Center maintained a compassionate, yet firm security presence, updating its pandemic response policies and processes, resulting in an orderly continuation of patient admissions and continuation of patient care.
Maria Henriquez
May 12, 2021

The Security Department at the El Centro Regional Medical Center (ECRMC) was put to the test, tasked with supporting the expansion of the hospital’s patient load to 50% above licensed capacity – far beyond any patient census in the hospital’s history. William DuBois, Security Department Manager at ECRMC, led the physical security through the pandemic, ensuring the Department’s updated mission of assuring the safety and security of patients, staff and visitors while maintaining the assets and business continuity of the hospital.


Read More
walkie-talkie-2534576_1920

Communication changes for remote security teams

Dave George
Dave George
May 11, 2021

Communication was already a challenge in the security industry with widespread teams or lone personnel in siloed locations. Now that COVID-19 has virtually eradicated in-person interactions and many team members are only working remotely, it is all the more difficult to keep everyone synced. The entire face of security communications has changed, escalating the need to find alternate ways to connect with the growing remote workforce. Internal and external communications are merging as security companies struggle to manage disconnected teams. Remote work now requires mobile communication delivery at an unprecedented level. Security professionals are discovering faster, more effective ways to communicate with simple, plug-and-play digital solutions.


Read More
Lifeline Speedlane Vision_SFX Images_2880 x 1620px

The future of AI integration with secured entrances

Integrated solutions using advanced analytics and artificial intelligence (AI) bring expanded functionality and enhanced security to swinging doors and turnstiles
kurt measom
Kurt J. Measom
May 11, 2021
While artificial intelligence (AI) is becoming an integral part of business operations in myriad market segments around the globe, security applications have been slower to adopt it into the mix. However, the added health risks organizations now face from COVID-19 have forced both security solutions providers and users to rethink how AI can help mitigate those risks.
Read More
sound-waves-freepik.jpg

Good sound versus bad sound and why it matters

Kelly lake
Kelly Lake
May 11, 2021

Enterprise security teams need the ability to see, and they need good sound—sound that is clear, intelligible, and understood, every time. Only then can security teams acquire actionable business intelligence, increase operational efficiency, and mitigate safety and security risks. What are some examples within enterprise security where “good sound” and high-definition audio can help security teams to reduce security risks?


Read More
SEC0521-Covid-ADM_Feat-slide1_900px

ADM unlocks the power of existing data for COVID-19 response

ADM and its security team tapped into existing data, both inside the company and publicly available, to enable informed decision-making and real-time insight into the company’s pandemic response plan including contact tracing, location insight and information, and facility occupancy.
Maggie Shein
Maggie Shein
May 11, 2021

ADM and its security team, including Kevin Wujek, Insider Threat Coordinator, tapped into existing data, both inside the company and publicly available, to enable informed decision-making and real-time insight into the company’s COVID-19 pandemic response plan including contact tracing, location insight and information, and facility occupancy.


Read More
k-12 security freepik

Now ransomware is inundating public school systems

Robert R. Ackerman Jr.
Robert R. Ackerman Jr.
May 11, 2021

Almost every American adult knows that cyberattacks and breaches are ubiquitous and have primarily targeted companies and government entities. They might even know that the single most common breach these days is ransomware, a malicious process by which hackers dismantle computer systems and don’t fix them until a ransom is paid. Few, however, are aware that ransomware is targeting a new set of highly vulnerable victims en masse. In recent months, the majority of successful ransomware attacks have struck K-12 schools nationwide, casting a whole new light on the number of Americans highly susceptible to a cyberattack.


Read More
Mental Health awareness week UK security officers

GMS Group offers security officers increased support amid Mental Health Awareness Week in U.K.

May 11, 2021
GMS Group is offering its security officers an increased level of support for Mental Health Awareness Week in the U.K.
Read More
iphone free

Lessons learned from the iPhone call recording app vulnerability

Michael Isbitski Headshot
Michael Isbitski
May 10, 2021

News quickly spread about a vulnerable call recording app for iPhone named “Call Recorder,” or “Acr call recorder,” as its listing in the Apple App Store states. TechCrunch was the first outlet to flag a design flaw with the mobile application’s API when it obtained call recordings from AWS S3 cloud storage to prove it was insecure and therefore open to API-based attacks. The weaknesses exhibited by the mobile app represent a vital shift occurring in cybersecurity towards the importance of the protection and hardening of APIs. From this instance alone, we can learn a number of valuable lessons as API attacks are set to rise drastically this year. Most of the issues in the Call Recorder vulnerability map directly to the OWASP API Security Top 10, a list that captures the most common API mistakes. This document is a great reference for DevOps and security teams that are looking to implement strong API security that can be applied to both web and mobile application systems, including those in the cloud.


Read More
Previous 1 2 … 340 341 342 343 344 345 346 347 348 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing