This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

SEC0419-drone-feat-slide1_900px

Drone Intelligence = Drone Defense

A holistic solution is necessary when it comes to drone defense, to include high sensitivity and high accuracy “drone intelligence.”
Avner Turniansky
April 12, 2019
A holistic solution is necessary when it comes to drone defense.
Read More
cyber7-900px.jpg

More Than Half of Organizations with Cybersecurity Incident Response Plans Fail to Test Them

April 11, 2019

A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77 percent of survey respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise.


Read More
financial- enews

Cybersecurity Innovation and the Patent Landscape

keith
Keith Bergelt
April 10, 2019
It can be expected that costs associated with cybercrime will rise in the near to medium term and have a material impact on the global economy – while putting individual citizens’ and corporations’ important data at risk by cyber criminals. Due to the convergence of an escalation in the number of security vulnerabilities, an increase in hacker capabilities and tools as well as new legislation being enacted in the European Union, the estimated costs due to cybercrime may be conservative.
Read More
globe- enews

Cybersecurity Trends To Watch For in 2019

Vijay Bharti
Vijay Bharti
April 10, 2019
Multiple cyber-attacks and compromise of personal information of millions of people globally show that the complexity and intensity of cybersecurity attacks are on the rise, and it could have broader political and economic ramifications. As cybercrimes become more lucrative and cybercriminals become smarter, cybersecurity too will have to be intelligence driven, enabling a swift response to the advanced attacks.
Read More
hacker- enews

Three Reasons Cybercriminals Continue to Succeed in Breaching Some of the Biggest Brands

Maxim Frolov
Maxim Frolov
April 10, 2019
In 2018, we witnessed some of the biggest data breaches ever – affecting businesses and consumers alike. From social media, hospitality, healthcare and even mail delivery, 2018 proved that there is no escaping cybersecurity flaws, regardless of the type of business or its popularity. For example, we witnessed the data of approximately 500 million Marriot guests get breached and a USPS security flaw that exposed the personal data of more than 60 million people.
Read More
airport-enews

Security Around the Clock: Hotel Safety for the Mobile Workforce

Matthew Bradley
Matthew Bradley
April 8, 2019
When traveling for business, it’s necessary for safety precautions to extend beyond the typical nine to five working parameters. Throughout the entirety of a business trip, business travelers should remain diligent around the clock, taking additional precautions to ensure their personal safety. There are several security measures both a business and its mobile workforce should keep in mind as they book business travel accommodations, check into their hotels in remote locations and conduct business while in an unfamiliar area.
Read More
screen-enews

Here's What the Wells Fargo Outage can Teach us About Risk Management

sash_sunkara
Sash Sunkara
April 8, 2019
Within the enterprise security and risk management community, there’s no debate about the financial impact of business downtime — a single hour of downtime can mean over $100,000 in losses for the overwhelming majority of businesses. But the consequences of downtime aren’t just monetary; they can be reputational as well.
Read More
SEC0419-IDmgmt-feat-slide1_900px

When Physical Intrusions Lead to Digital Breaches

Ed Finkel
April 4, 2019

Healthcare institutions lock down access through proper ID management and employee training.


Read More
leadership 2

Bringing Different Backgrounds to Your Intelligence Team

Daniil Davydoff
Daniil Davydoff
April 4, 2019

Recruiting people of varying backgrounds into private sector intelligence is just as important as in the rest of the security industry.


Read More
Security newswire default

New Research: Reports of Harassment Continue to Increase

April 3, 2019

The 2019 Ethics & Compliance Hotline Benchmark Report by NAVEX Global® shows an overall 18 percent increase in harassment reports during 2017 and 2018 with 41 percent of reports substantiated.


Read More
Previous 1 2 … 450 451 452 453 454 455 456 457 458 … 569 570 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

Popular Stories

Security's Most Influential People in Security 2023

Security's Most Influential People in Security 2023

Human hand and AI Hand

Study finds increase in cybersecurity attacks fueled by generative AI

open computer with green vertical text

Amerita and PharMerica announce data breach

Ava Cooper-Davis Global and U.S. Chief Security Officer Deloitte

Ava Cooper-Davis | Most Influential People in Security 2023

vertical white lines on dark screen

CISA and FBI release joint cybersecurity advisory

SEC Exterro webinar

SEC Axis Communications webinar

Most Influential People in Security 2023

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Average Security Professionals Salary

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing