Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

keys-cyber-enews

Washington Privacy Act Update: Private Right of Action Added in House

megan herr
Megan Herr
malia rogers
Malia Rogers
david stauss
David M. Stauss
March 4, 2020
On Friday, February 28, 2020 the Washington House Innovation, Technology & Economic Development Committee (ITED) voted to pass a strengthened version of the Washington Privacy Act (WPA) out of committee. On February 14, the Washington Senate voted overwhelmingly to pass the WPA. Yet, after moving to the House, the WPA encountered substantial resistance from privacy advocates. At a public hearing on February 21, 2020 privacy advocates argued against the WPA’s lack of a private right of action, facial recognition provisions and preemption of local laws, among other things.
Read More
SEC0320-News3-Feat-slide1_900px.jpg

Security Executives on the Move

Security executives on the move! Which industry leaders have recently begun new roles?
March 4, 2020

Which security executives have recently changed positions? Have you begun a new role? Email us at ritcheyd@bnpmedia.com


Read More
SEC1019-career-Feat-slide1_900px

As Cyber Attacks Become More Prevalent, Here’s Why Your Small Business is at Risk

shena tharnish
Shena Tharnish
February 28, 2020
While many cybersecurity attacks and breaches happen at major enterprise organizations, the reality is cybercriminals don’t discriminate by size and the aftermath of an attack can devastate a small business.
Read More
SEC1018-note-Feat-slide1_900px

How Mass Notification Tools Can Help Improve Workplace Safety

PatScheckel
Pat Scheckel
February 28, 2020
While many workplaces have certain safety measures in place, many lack a cohesive system for alerting and managing situations.
Read More

National Cyber League Spring Season Now Open

February 26, 2020

Registration is now open for the spring season of the National Cyber League (NCL) competition.


Read More
Arteco Facial Recognition Algorithm - Security Magazine

Facial Recognition Technology: Minimizing Risk in the Face of Increasing Liability

David J. Oberly
David Oberly
Jeffrey N. Rosenthal
Jeffrey Rosenthal
Ana Tagvoryan
Ana Tagvoryan
February 26, 2020

At the turn of the century, facial recognition technology was more science fiction than fact. Rapid advances have fueled a proliferation of this technology — which continues to expand into new areas of public and private life. At the same time, various states and municipalities are enacting new, stringent laws regulating the use of facial recognition technology by commercial entities.


Read More
meeting1-900px.jpg

Internet Security Alliance and National Association of Corporate Directors Release Guide for Cyber-Risk Oversight

February 26, 2020

The National Association of Corporate Directors (NACD) and the Internet Security Alliance (ISA) released a new, updated Director’s Handbook on Cyber-Risk Oversight, a guidebook to help boards navigate cyber-risk oversight.


Read More
key-enews

How CSOs Can Strategically Keep Security on the Map

Part 1
bob posica
Bob Pocica
February 25, 2020
Chief Security Officers (CSOs) are charged with protecting an organization’s assets and people. Like all corporate functions, the design of this department will vary greatly depending upon the organization. However, the process by which a program is designed, measured and evaluated has some consistent principles across different industries. This series explores how to make your physical security program more strategic, and how to secure funding for this objective.
Read More
SEC0919-Assurance-Feat-slide1_900px

Unprepared for CCPA? It Could Cost Your Organization

Here’s how to achieve compliance and potentially cut costs at the same time
Safi Raza
February 25, 2020
Studies and surveys consistently show that cybersecurity and data protection is one of the top five concerns of internal auditors, who worry that their organizations lack the internal resources to deal with security risks. On January 1, 2020, the California Consumer Privacy Act (CCPA) became effective, requiring new data privacy measures at most US organizations. Yet it is estimated that less than 10 percent are fully prepared for compliance with CCPA. Unfortunately, in this case, ignorance is not bliss and may result in hefty fines.
Read More
video monitors

How Retailers Can Leverage Their Security Infrastructure to Improve Operational Efficiency

jordan rivchun
Jordan Rivchun
February 25, 2020
Retailers today face a number of security challenges, including shoplifting, shrink and theft at the point of sale, protecting the premises after hours, slip and fall lawsuits and much more. Adding complexity to the security challenge is that retailers face these threats in a variety of locations within stores, each of which comes with its own unique requirements. Today’s flexible, intelligent surveillance cameras offer a variety of form factors and capabilities that allow them to address the range of security and operational challenges.
Read More
Previous 1 2 … 291 292 293 294 295 296 297 298 299 … 302 303 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing