Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

The MITRE Corporation has a lab in the FAA-sponsored Center for Advanced Aviation System Development FFRDC

Study finds MITRE ATT&CK improves cloud security, yet security leaders struggle to implement it

October 9, 2020
McAfee and the University of California, Berkeley’s Center for Long-Term Cybersecurity (CLTC) released a new research study, MITRE ATT&CK as a Framework for Cloud Threat Investigation, developed by CLTC researchers. The report focuses on threat investigation in the cloud through the lens of the most widely adopted framework, MITRE ATT&CK.
Read More
george campbell

George Campbell wins US OSPA Lifetime Achievement Award

October 9, 2020
SEC emeritus faculty George Campbell has been recognized with the 2020 U.S. Outstanding Security Performance Award (OSPA) for Lifetime Achievement. The winners were announced September 25.
Read More
Crede Bailey in hospital with COVID

Head of White House Security reportedly critically ill with COVID-19

October 9, 2020
The security office head, Crede Bailey, who is in charge of the White House security office contracted coronavirus last month and has been hospitalized since September.
Read More
enterprise security with a work from home culture

Increased enterprise security for the “new normal” working culture

Ian Ferguson
October 9, 2020

Security professionals want functionality like data encryption and VPN to be permanently enabled. Some have taken the approach of completely disabling the insertion of USB devices. This needs to be supported with more fine-grained control. What is the path forward?


Read More
SEC1020-Electronic-Feat-slide1_900px

Switching to electronic access control

What are the seven myths surrounding making the switch to electronic access control solutions?
Brad Smith
October 9, 2020

Amid ever-changing technology, embracing modern security solutions and capabilities can be a challenge for many, especially those who have spent years accustomed to tried-and-true products, like the traditional keyed padlock. Today, decision makers working in the security sector are tasked with sorting through the blitz of new technology offerings and introductions.


Read More
hacking cyber

Rise in mercenary hacking groups and cyber espionage

October 8, 2020
As the 2020 U.S. presidential election nears, there has been a rise in mercenary hacking groups and cyber espionage. Some say this a direct result of the current administrations’ increasingly isolationist global foreign policy, and that the U.S.’ status in the global cyber domain should be a major discussion point before November.
Read More
CSUSB

CSUSB receives national cybersecurity designation & $10.5 million grant

October 8, 2020
The National Security Agency (NSA) has chosen Cal State San Bernardino to be a leader of its core workforce development initiative, selecting it for a $10.5 million grant and naming the university’s Cybersecurity Center as the Community National Center for Cybersecurity Education. This prestigious designation illustrates CSUSB’s continued prominence as the premier institution of higher education for cybersecurity education and took effect Sept. 18, 2020. 
Read More
cyber

CISA warns of resurgence of Emotet cyberattacks

October 8, 2020
Emotet — a sophisticated Trojan commonly functioning as a downloader or dropper of other malware — resurged in July 2020, after a dormant period that began in February. Since August, CISA and MS-ISAC have seen a significant increase in malicious cyber actors targeting state and local governments with Emotet phishing emails. This increase has rendered Emotet one of the most prevalent ongoing threats.
Read More
budget-enews

Threat of fines, not FUD, drives board decisions on cybersecurity spend

October 8, 2020

Thycotic, provider of privileged access management (PAM) solutions, released its CISO Decisions survey. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure. Because of this, the research shows more than half, 58 percent, of respondents say their organizations plan to add more towards security budgets in the next 12 months. 


Read More
avatars-5615501_1920

Using Technology for COVID-19 Response

Maggie Shein
Maggie Shein
October 8, 2020

As security professionals around the globe are involved in their organization’s COVID-19 response, many security staff are contemplating how to assess their protocols and procedures, as well as what new protocols and procedures to put in place. How can security technologies be a part of the overall COVID-19 response for an enterprise and how can security professionals use technology now that will serve them well in the future with continued enterprise risk mitigation?


Read More
Previous 1 2 … 415 416 417 418 419 420 421 422 423 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing