Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

When Is Your Enterprise Liable for Outsider Violence on Campus?

October 8, 2013
While the terminology varies somewhat, businesses may anticipate three categories of individuals entering their premises: guests, invitees, and trespassers.
Read More

Debating the NSA, Espionage and Hackers with Congressman Mike Rogers

A Frank Look at the World Today with Congressman Mike Rogers
Mattice-2016-200px.jpg
Lynn Mattice
October 1, 2013

U.S. Representative Mike Rogers (R-MI) is hard at work in Washington D.C., despite Congressional recess, when other lawmakers have returned to their respective districts and even the President and his family escape the heat to a vacation destination. 


Read More

The Security Service Economy

More and more, security is focusing its value proposition on a service culture.
October 1, 2013

More and more, security is focusing its value proposition on a service culture. While this topic has been raised by many CSOs in recent years, the volume and frequency of the subject reached a peak recently and deserves some attention. 


Read More

How to Manage Physical Asset Risk

Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.
Mattice-2016-200px.jpg
Lynn Mattice
October 1, 2013

Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.


Read More

Social Media Forces Risk Management Changes in At-Risk Countries

September 30, 2013

The speed at which political instability spreads is now inextricably linked to social media, as disaffected populations around the globe turn to this powerful outlet to drive demonstrations, according to a new Marsh Risk Management Research briefing, Social Media Heightens Political Risks in Emerging Markets.


Read More

Prosecutors Call for Updated White Collar Crime Laws

September 25, 2013

New York's antiquated laws against public corruption, computer crimes and fraud -- including swindles targeting the elderly -- would be beefed up under a series of wide-ranging proposals.


Read More

The Most Influential People in Security 2013

Nominated by their colleagues and associates, these top enterprise security executives are changing the security landscape for the better.
September 1, 2013

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.


Read More

Is Your Program Security Theater?

Is your department making the enterprise safer, or is it a false sense of security? Take our quiz to find out!
Roger G. Johnston Ph.D. Jon Warner PhD
September 1, 2013

 Security guru Bruce Schneier coined the term “Security Theater” to describe phony security measures, procedures, or technologies that give the superficial appearance of providing security without actually countering malicious adversaries to any significant degree.  


Read More

How to Safeguard Your Information Assets

How are lapses in cyber security leading to the loss of billions of dollars worth of intellectual property?
Mattice-2016-200px.jpg
Lynn Mattice
September 1, 2013

In today’s “Internet of Everything,” most enterprises dramatically underestimate the extent and scope of cyber-based attacks.


Read More

How Female Terrorists Use Preconceptions to their Advantage

Male terrorists tend to get most of the press, but terrorist cells are recruiting more women, often due to security forces considering them less suspicious.
Dean C. Alexander
September 1, 2013

 The May 2013 edition of the FBI’s Most Wanted Terrorist Listincluded its first woman – Joanne Chesimard, wanted for the 1973 killing of a New Jersey State Trooper.  


Read More
Previous 1 2 … 620 621 622 623 624 625 626 627 628 … 640 641 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing