Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
Security Enterprise Services RSS Feed RSS

mobile

Mobile Credentials: Why Should You Adopt Them and What You Need to Know

Maria Henriquez
May 1, 2019

According to a report from App Annie, people use nine applications daily, and in a month, they use 30. Why is this relevant? Brivo’s study, “3 Key Drivers to Technology Adoption in Physical Security”, reveals 81 percent of survey respondents are reliant on mobile applications to manage their facilities and people and 62 percent of them are using one to five mobile applications for work.


Read More

Three Key Learnings for CEOs from Last Month's ASUS Hack

Chris Hickman
April 30, 2019
Last month’s ASUS APT attack doesn’t come as a surprise to any security-conscious industry watcher – this highlights a long-standing flaw in many software supply chains today. Attackers have been engaged in spoofing websites, stealing credentials and gaining unauthorized access for years. Injecting malicious code into legitimate tools that are designed to protect represents the next evolution in putting companies and their customers at risk.
Read More
cyber-attack

The Cybersecurity Talent Gap = an Industry Crisis

DaveBarton
Dave Barton
April 30, 2019
Both the government and the private sector are scrambling for talent. Thousands of information-security jobs are going unfilled as the industry in the U.S. struggles with a shortage of properly trained professionals. By one estimate, there will be 3.5 million unfilled cybersecurity jobs by 2021.
Read More
vendor selection

Many Vendors, Many Decisions: How Safeguarding your Vendor Selection Practices Can Help Reap Rewards for your Security Enterprise

Ken-Lamarca
Ken LaMarca
April 30, 2019
Many enterprises face challenges when choosing the right security partners to implement and maintain their systems. Security management places a premium on their specific physical security strategies, either because of the complexity of their needs, or the specific system demands and compliance regulations associated with their specific business classification. Therefore, the goal should be to partner with suppliers whose focus is to deliver the solutions that best fulfil desired system functionality and operations.
Read More

Access Control Systems to be Installed in Wyoming Schools

April 22, 2019

School security funding for better locks was approved by the Teton County School District (TCSD) No.1 Board of Trustees, according to the agreement published by the Board of Trustees website. 


Read More
smartphone1-900px.jpg

Phone Scams Cause Americans to Lose $10.5 Billion in 2018

April 21, 2019

Millennials and men are more often fooled by scams and robocalls, says a new report.


Read More
Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Georgia Tech Security Breach Exposes 1.3 Million Records

April 17, 2019

Unauthorized access to a Georgia Institute of Technology web application has exposed personal information for up to 1.3 million individuals, including some current and former faculty, students, staff and student applicants, Georgia Tech reports. 


Read More
Women at work

U.S. Reps Clark and Pressley Introduce 'Be HEARD' Act to Protect Workers from Workplace Sexual Harassment

April 13, 2019

U.S. Representatives Katherine Clark and Ayanna Pressley, both of Massachusetts, introduced an anti-sexual harassment bill in the House that aims to reduce workplace inequalities, mistreatment, and violence for all workers.


Read More
SEC0419-city-feat-slide1_900px

The Impact of City Surveillance and Smart Cities

In the infancy of smart cities, there are potential implications to consider too.
Sarah Ludwig Rausch
April 10, 2019

How can city surveillance solutions ensure improved safety and better quality of living for citizens?


Read More
airport-enews

Security Around the Clock: Hotel Safety for the Mobile Workforce

Matthew Bradley
Matthew Bradley
April 8, 2019
When traveling for business, it’s necessary for safety precautions to extend beyond the typical nine to five working parameters. Throughout the entirety of a business trip, business travelers should remain diligent around the clock, taking additional precautions to ensure their personal safety. There are several security measures both a business and its mobile workforce should keep in mind as they book business travel accommodations, check into their hotels in remote locations and conduct business while in an unfamiliar area.
Read More
Previous 1 2 … 297 298 299 300 301 302 303 304 305 … 367 368 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing