Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

3 Lesser-Known Campus Security Challenges and How to Address Them

Stuart Rawling
Stuart Rawling
May 27, 2020
What are some often-overlooked campus security pain points, and how can they be addressed?
Read More
The Los Angeles Airport police have a full-time emergency services unit armed with rifles and a tactical team that provides protection in those areas along with patrol officers

Addressing Terrorism and Crime in Your City: Why the Public and Private Sectors Need to Work Together

Giovanni Gaccione
Giovanni Gaccione
May 26, 2020
All too often, business leaders, city planners, fire departments, and law enforcement focus on their mandates to the exclusion of others. Unfortunately, this approach can lead to a breakdown in communication and missed opportunities. In the worst cases, it can create a lapse in security that could make their city and its citizens vulnerable to criminal activity and terrorist attacks. But, by eliminating these silos and fostering strong communication, stakeholders can share information that allows them to quickly address evolving situations.
Read More
cloud-enews

Haven't Considered Cloud? Now may be the Time

Per Björkdahl
May 26, 2020
Ready or not, cloud is already making its impact on the industry. While it’s not a new technology to the industry, it continues to see growth, driven by growing possibilities in the IoT space. Security end users and their organizations are shifting to truly embrace the cloud, with worldwide spending on public cloud services and infrastructure forecasted to reach $210 billion in 2019 – an increase of 24 percent over 2018. Cloud services can provide benefits not only to large enterprise organizations, but small and mid-sized businesses as well by providing cost-effective solutions and increased flexibility.
Read More
SEC1219-cybergap-Feat-slide1_900px

Cyber Resilience: A New Way of Looking at Cybersecurity

supriya kumar
Supriya Uppal Kumar
May 26, 2020
The risks of an attack are not new, but as incidents become more sophisticated and persistent, organizations need to move from cybersecurity to cyber resilience.
Read More
Black Hat USA

Black Hat USA Announces Briefings and Programs for 2020 Virtual Event

May 26, 2020

Black Hat announced details for its virtual event, taking place August 1st – 6th. 


Read More
building

Four Reasons to Integrate Security Early in Design: Safety, Savings, Aesthetics & Support

Ryan T. Searles
Ryan T. Searles
May 22, 2020
When we do a risk assessment, we evaluate the facility’s needs and identify any gaps in their physical security barriers and policies and procedures. Why should you integrate security early in the design process?
Read More

Philip Lerma Named Senior VP and Chief Risk Officer at Green Dot Corporation

May 21, 2020
Payments industry executive, Philip Lerma, has been appointed Senior Vice President & Chief Risk Officer at Green Dot Corporation.
Read More
The Cyber 101 Discussion

Navigating the Unknown: Lessons Learned in the Full-Scale Transition to Remote Work

Ian Pitt
Ian Pitt
May 21, 2020
Many weeks have passed since organizations around the globe closed their physical doors and transitioned to full-scale remote work. This ‘new normal,’ as many are calling it now, has brought upon countless changes for IT teams.
Read More
The 5 D’s of Outdoor Perimeter Security - Security Magazine

Utilizing Intelligence to Extend the Security Perimeter

eric velez-villar
Eric Velez-Villar
May 20, 2020
Extending the perimeter by instituting a corporate security intelligence program enables companies and organizations to stay well ahead of threats and often helps inform strategic and operational decision-making.
Read More
Top 3 Misconceptions About Data After Death - Security Magazine

Using a Privacy-First Mindset to Transform Data into Intelligence

Robert Burcham
Robert Burcham
May 19, 2020
Why does the practice of Data Economy typically requires a solid understanding of the characteristics of the underlying data resource? And how can that data be transformed into useful intelligence, where these processes are carried out with the upmost care to represent the interests of the Data Subject?
Read More
Previous 1 2 … 279 280 281 282 283 284 285 286 287 … 300 301 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing