Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

supply chain

Who is responsible for supply chain security?

Security Staff
April 11, 2022

Managing third-party risk is integral to maintaining enterprise cybersecurity and supply chain security. Determining who in the enterprise is responsible for third-party vendor security can help reduce risk, according to NCC Group research.


Read More
software development

67% of app developers have shipped code with known vulnerabilities

Security Staff
April 11, 2022

Securing the software supply chain is a monumental task for cybersecurity leaders. A survey from Secure Code Warrior investigated how application developers view security in their work.


Read More
Risk mitigation
Education & Training

Risk mitigation for domestic terrorism and radicalization

Maggie Shein
Maggie Shein
April 11, 2022

The risk of radicalization for private and public organizations is real. Security leaders can mitigate some risk by evaluating processes and procedures.



Read More
hospital door

Access control considerations for healthcare settings

Security Staff
April 8, 2022

The COVID-19 pandemic accelerated the adoption of security technologies and touchless solutions, according to the 2022 Health Care Trends Report from Allegion. Electronic access control plays a large role in hospital environments.


Read More
databases-freepik1170.jpg

Block confirms Cash app breach affecting 8m users

Maria Henriquez
April 8, 2022

Block confirmed the data breach that affected 8.2 million users was the result of data theft by a former employee. 


Read More
lucas moody headshot

Lucas Moody named SVP and CISO at Alteryx

Security Staff
April 8, 2022

Former Twitter security leader Lucas Moody has been named Chief Information Security Officer (CISO) and Senior Vice President at Alteryx.


Read More
Robin Andruss.jpg

Robin Andruss named Chief Privacy Officer at Skyflow

Maria Henriquez
April 8, 2022

Robin Andruss has joined Skyflow as Chief Privacy Officer to oversee data privacy and data protection commitments for enterprise, fintech, and healthcare organizations.


Read More
cybersecurity-controls-freepik1170x658.jpg

5 steps to strengthen cybersecurity defenses in wake of Ukraine-Russia crisis

Ivan Vinogradov
April 8, 2022

Five practical steps to increase an organization's security posture and resilience to protect against potential attacks related to the Ukraine-Russia crisis.


Read More
cyber attack

The success of cyber insurance lies in risk standardization

Saket Modi
April 8, 2022

Cyber insurance premiums are rising, and enterprise organizations looking into insurance have to meet various cybersecurity standards before gaining coverage. Standardizing risk measurements may help the industry stay protected in a time marked by rising cyberattacks.




Read More
the Great Resignation

The Great Resignation poses security concerns for organizations

Justin Fier
April 8, 2022

The Great Resignation opens the door to higher levels of insider threats, with ex-employees accidentally bringing enterprise data with them into new roles or intentionally introducing malware into a former employer's system. Here's how organizations can protect themselves from insider risk.


Read More
Previous 1 2 … 220 221 222 223 224 225 226 227 228 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing