Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

Rail worker

The new normal has created more lone workers than ever – They need to be protected

Brent Duncan
August 25, 2020
As the pandemic continues to interrupt business as usual, companies are exploring new ways to cope with both the mandated and voluntary restrictions to their operations. One way in which business models have adapted to keep costs under control is by utilizing more lone workers for opening, closing, third shifts, curbside deliveries and other customer interactions outside of the premises. While this has helped many organizations trim costs, it has also exposed lone workers to greater risks. 
Read More
camera-cyber

Three ways banks can benefit from AI-powered IP cameras

Nathan Dinning headshot
Nathan Dinning
August 25, 2020

Banks, like other businesses, are taking precautions to make customers feel safe during the COVID-19 pandemic. Placing physical distancing markers on the floor, sanitizing ATMs, installing plexiglass partitions at teller booths and requiring scheduled appointments are just some of the ways financial institutions are mitigating risks for customers. Video surveillance can play a vitally important role right now, as banks look to ensure compliance with these new COVID-related safety measures. IP cameras with intelligent security analytics can help rapidly and accurately detect compliance issues, as well as other suspicious or atypical behavior. After all, banks must continue to monitor physical security even throughout the pandemic and today’s IP cameras with intelligent system-on-chip (SoC) technology can help lessen this burden with highly accurate notifications.


Read More
Will Security Enterprises Survive the Digital Transformation? - Security Magazine

Top 5 digital transformation use cases in the public sector

Brandyn Campbell
Brandyn Campbell
August 25, 2020
Here are five key use cases to guide, help and support digital transformation efforts to better serve constituents and government employees.
Read More
airport TSA collects $1M in forgotten left behind money

South Africa publishes country-wide draft code of workplace violence and harassment prevention

August 24, 2020

The South African government published a draft code of good practice on the prevention and elimination of violence and harassment in the workplace and covers a number of areas including sexual harassment and online bullying. The code applies to all business sectors both public and private across across the country.


Read More
SEC0819-5G-Feat-slide_900px

Building a secure bridge for point-to-point connectivity

Michael Abad Santos
Michael Abad-Santos
August 24, 2020
The year 2020 has served up some unprecedented challenges for the human race in every aspect, with wireless connectivity more important than ever. Particularly as millions continue to work and learn remotely, our connected world of devices, vehicles, homes and cities is expanding exponentially. According to a report from GSMA and ABI Research, the number of mobile subscriptions worldwide had already reached 8.1 billion by 2017 at an annual growth rate of 5.4 percent. It’s now predicted that by 2025 the number will increase to 9.8 billion, with 3G and 4G representing 51 percent of total subscriptions and 91 percent of the total traffic generated, while 5G subscriptions are expected to exceed 849 million.
Read More

So, what is the safest password policy? It’s complicated

New Stu Sjouwerman CEO KnowBe4.jpg
Stu Sjouwerman
August 24, 2020
Let’s face it, passwords are a pain. As we’ve been pushed towards using longer and ever more complex passwords, and told to update them with increasing frequency, password management has become something of a headache. We’ve gone from simple, easy to remember passwords to 12- or 16-character passwords that must contain a mixture of upper and lowercase letters, numbers and symbols.
Read More
internet of things

IoT: The Internet of Threats and how users can defend themselves

Chris Clements
Chris Clements
August 24, 2020
According to IDC, by 2025 there will be 41.6 billion Internet of Things (IoT) devices, generating a massive 79 zettabytes (ZB) of data. To put that into perspective, in 2006, IDC estimated that the total amount of electronic data created and stored was a mere 0.18 ZB. This growing amount of data represents a vast and exponentially increasing attack surface, which poses a huge opportunity for cybercriminals and a seemingly insurmountable task for those responsible for protecting and securing it. This task is only made more difficult by the lack of regulation and security measures being built into IoT devices at present. As IoT looks to become a foundational aspect of our everyday lives, it’s vital we, as consumers, understand the threats posed to our devices and the data they store.
Read More
voting

Election Infrastructure Government Coordinating Council (GCC) holds summer meeting virtually

August 21, 2020
The Election Infrastructure Government Coordinating Council (GCC) held its summer meeting virtually to discuss Election Day preparations and other areas of coordination between the federal government and state and local election officials.
Read More

Health agencies are gathering data to combat COVID-19: Here’s why that might be a problem and what to do about it

Thomas F. Kelly
August 21, 2020
After months of social distancing, the coronavirus remains a serious public health challenge. As states across the country devise plans to reopen their local economies, government agencies and private healthcare providers are hungry for reliable data.
Read More

Cybersecurity issues for returning to the office

Tiffany Garcia
Tiffany Garcia
August 21, 2020
As many employees transfer back to a more traditional business setting from remote work environments, adjustments to cybersecurity protocols are going to be necessary. Organizations will need to evaluate any temporary provisions that were put into place during the COVID-19 pandemic, including any shortcuts that were taken and processes that were circumvented, and whether such protocols should be reversed or enhanced.
Read More
Previous 1 2 … 434 435 436 437 438 439 440 441 442 … 634 635 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing