Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
Security Enterprise Services RSS Feed RSS

Hikvision and Earthworks Farm Support a Healthy Community

September 16, 2014

Hikvision USA joined with Earthworks Farm, a work-training and educational urban farm in Los Angeles County, to promote healthy lifestyle choices to the local community.


Read More

Unruly Chargers Fan Can't Sue Security Officer

September 9, 2014

A security officer hired by the San Diego Chargers cannot be held liable for restraining an unruly fan at Qualcomm Stadium who was making obscene gestures during a football game. 


Read More

Mitigating Workplace Violence Risks with Awareness, Deescalation

Workplace violence incidents happen every day, in every industry, and statistics show reports that these events are on the rise.
Sarah Ludwig
September 1, 2014

Depending on the environment you’re in, physical safeguards such as desks, railings and panic buttons can be helpful deterrents. “You don’t want to make it look like a prison, but at the same time, you can make minor modifications that help protect.


Read More

Robots Could Run Security Screening Soon

Americans vying for national security clearances in the future can expect a face-to-screen experience as an on-screen avatar conducts computer-generated interviews.
September 1, 2014

According to a study from the National Center for Credibility Assessment, programs using computer-generated interviews can be less “time-consuming, labor-intensive and costly to the Federal Government,” and that interview subjects are more likely to admit certain things to a robot, such as alcohol use and mental health.


Read More

5 Essential Cybersecurity Truths for CFOs

Cyber attacks have become one of the most worrisome risks considered chief financial officers
September 1, 2014

The rate of CFOs citing cyber attacks as a key concern has risen sharply over the survey’s four-year history, directly correlating to both the frequency and cost of cyber attacks.


Read More

Confindential Document Destruction Decreases in 2014

While 86 percent of C-Suite executives are aware of the legal requirements supporting the protection of confidential data, one in five have never performed a security audit
September 1, 2014

The study also found that almost half of the small business owners surveyed conduct no regular audits of their security protocols, and three in 10 have never performed an audit.


Read More

Why You Need Tactical Medical Training

Imagine being at ground zero for the Boston Marathon bombing.
diane-2016-200.jpg
Diane Ritchey
September 1, 2014

Having Lock-Down Protocols are useful, however it can delay law enforcement’s entry time. Do not expect to always escort law enforcement to threat areas; directions and diagrams are very helpful.


Read More

Facing the Risks of Social Media Account Takeovers

Social media is playing an increasingly important role in global business marketing strategies – and for good reason.
John Worrall
September 1, 2014

It is easy for hackers to hijack global social media accounts because of the sheer volume of accounts of this type and the large number of people managing them.


Read More

Enhancing the Security Experience with Social Applications

How social applications will transform the security experience
Steve Van Till
Steve Van Till
September 1, 2014

Social spaces will be able to identify and know their inhabitants, visitors, guests, caretakers, administrators, and any other people who interact with them. This knowledge is a fundamental building block because social relationships are built on the concept of stable personal identity over time.


Read More

How Enterprise Situational Awareness Builds Metrics

It’s a common phrase in the security field: “There is no silver bullet to prevent incidents.”
September 1, 2014

By combining video surveillance and big data gathered throughout the enterprise, he and his team can look for red flags, such as one particular bartender who has low revenue, a high number of voids and no-sales.


Read More
Previous 1 2 … 335 336 337 338 339 340 341 342 343 … 366 367 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing