Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

coronavirus

Using Mass Notification to Stay in Touch with Remote Workers during Coronavirus

PatScheckel
Pat Scheckel
March 19, 2020
While the overall impact of the coronavirus is still in question, organizations can mitigate the damage it may cause by using mass notification stay in contact with their employees to keep them informed about any changes or developments.
Read More
criminal records

Continuous Evaluation Supports and Fosters Second Chances for Those Formerly Incarcerated

Tom Miller
March 19, 2020

Continuous evaluation can pick up and make note of concerning behaviors among employees, giving an employer the ability to intervene in negative behaviors that take place after the initial background check and before something serious happens to the individual or their organization. Once alerted to concerning employee behavior, employers can unlock multiple organizational support mechanisms, including having HR speak to the individual about the potential cause.


Read More
SEC0320-public-feat-slide1_900px

A Public Private Partnership: the DSS and Enterprise Security

How does the the U.S. Diplomatic Security Service interface with public safety responders, and what can enterprise security learn from their successes?
Maria Henriquez
March 18, 2020

Meet the United States Diplomatic Security Service (DSS) – a federal agency that can serve as an exemplar model on how to interface with public safety responders, domestically or abroad.


Read More
coronavirus

Incident Management Protocols during COVID-19

Juan Kirsten
March 18, 2020
Limiting the spread and collateral damage that COVID-19 poses to the world will heavily depend on the level of situational awareness of the people on the ground and their reaction speed. What are some incident management protocols security leaders should keep in mind during COVID-19?
Read More
ransomware

Ransomware: Avoid Becoming the Next Victim

New Stu Sjouwerman CEO KnowBe4.jpg
Stu Sjouwerman
March 18, 2020

Ransomware has quickly emerged as a massive cybersecurity threat and is evolving continuously. Certainly, recent ransomware incidents should serve as a wake-up call for all businesses to remain vigilant against ransomware. To minimize the chances of being victimized by ransomware means going back in time to understand how ransomware developed and how it evolved.


Read More
cybersecurity-laptop

Maintaining Privacy and Cybersecurity Vigilance during the Coronavirus Outbreak

Mindi Giftos
Mindi Giftos
March 17, 2020
Part of any good cybersecurity program rests on spreading good habits and inculcating employees with best practices around handling data and using network resources. In this cybersecurity is as much a behavioral challenge as it as a technological one. That’s precisely why the recent coronavirus outbreak, or COVID-19, is so potentially harmful to a company’s cybersecurity efforts.
Read More
SEC0320-soft-feat-slide1_900px.jpg

Securing Soft Targets and Crowded Places

How can enterprise security secure soft targets and crowded places without intruding on the entertainment aspect of events?
Maria Henriquez
March 13, 2020

What do you and your team need to know about securing soft targets and crowded places?


Read More
Is Your Vendor Risk Management Program Working? - Security Magazine

A Look into a CISO’s First Quarter

wayne reynolds
Wayne Reynolds
March 12, 2020
Becoming a new CISO brings new exciting opportunities and responsibilities but also new challenges and pressure. In the past few years, the role of the CISO has become increasingly complex as it evolves from a predominately technical role to a more strategic, advisory capacity.
Read More
Here, a CDC healthcare worker takes the proper measurements to ensure that she is protected in an Ebola clinic in West Africa - Security Magazine

A Guide to Situational Awareness and Hospitality Protocols to Combat the Coronavirus

Jean-Pierre Roux
March 11, 2020
Human resources departments (HR) handing out information sheets is not going to curb the spread of the Coronavirus (COVID-19). Training has to be conducted in concert and in person to all by the security department, as, it is a security threat. Here are some protocols and policy management procedures your enterprise and security department should consider to mitigate the spread of Coronavirus. 
Read More
SEC0320-val-feat-slide1_900px.jpg

Cybersecurity at Val Verde ISD

How does the team at the Val Verde ISD protect the data of its students, faculty and staff?
March 11, 2020

How does the team at the Val Verde ISD protect the data of its students, faculty and staff? 


Read More
Previous 1 2 … 288 289 290 291 292 293 294 295 296 … 302 303 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing