Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Physical » Identity Management

Identity Management
Identity Management RSS Feed RSS

password

Consumers Prefer Biometric Authentication to Passwords

January 9, 2020

Passwords are a double-edged sword: they are meant to protect information, but they are also frustrating with so many to remember and manage.


Read More
Cannabis

Chicago Airports Unveil Cannabis 'Dumping' Boxes

January 8, 2020
Chicago's O’Hare International Airport and Midway Airports have installed boxes for travelers to dispose of recreational marijuana before traveling. 

Read More
Airport at Sunset

Business Travel is Tough on Mental Health

January 3, 2020

A survey of 500 frequent business travelers has found that business travel can have a negative impact on mental health.


Read More
drones

FAA Proposes Remote ID Technology for Drones

December 30, 2019

The Federal Aviation Administration has issued proposed rules for the remote identification of drones in the U.S.


Read More
Mission 500

Mission 500 Announces Call for Nominations for 2020 Corporate Social Responsibility and Humanitarian Awards

December 30, 2019

Mission 500, a non-profit charitable organization focusing on the security industry and dedicated to serving children and families in need across the U.S., is now accepting nominees for their 2020 Corporate Social Responsibility (CSR) Award and 2020 Humanitarian Award.


Read More
police1-900px.jpg

Mass Killings in US Hit New High in 2019

December 30, 2019

Data compiled by The Associated Press, USA Today and Northeastern University shows that there were more mass killings in 2019 than any year dating back to at least the 1970s.


Read More
Marlon Lynch

Marlon Lynch Named Chief Safety Officer at University of Utah

December 27, 2019

Marlon C. Lynch has been named the University of Utah's first chief safety officer.


Read More
Coding data breach

A Look Back at the Most Prominent Data Breaches in 2019

craig lurey
Craig Lurey
December 27, 2019

While there is still time left in 2019, according to the recent Data Breach QuickView Report, there were 5,183 breaches reported just in the first nine months of 2019 exposing 7.9 billion records.


Read More
facial recognition

NIST Study Says Facial Recognition Can be Biased

December 20, 2019

A new NIST study examines how accurately face recognition software tools identify people of varied sex, age and racial background.

 


Read More
hacker

Election Hacking, ‘Hybrid Threat Actors’ Could Top List of 2020 Cyber Threats

December 18, 2019

A focus on privacy, evolving threat actors, pervasive deepfake videos and increased election interference are among the issues Optiv Security sees taking on greater importance in the New Year.


Read More
Previous 1 2 … 54 55 56 57 58 59 60 61 62 … 141 142 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing