Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Sectors » Transportation/Logistics/Supply Chain/Distribution/ Warehousing

Transportation/Logistics/Supply Chain/Distribution/ Warehousing
Transportation/Logistics/Supply Chain/Distribution/ Warehousing RSS Feed RSS

Capitol Technology University partners with CMMC cybersecurity and supply chain security

Cybersecurity Maturity Model Certification Center of Excellence partners with Capitol Technology University

January 13, 2021

The goal of the partnership is to improve the training and education of the workforce in support of cybersecurity protection and resilience along with supply chain risk management.


Read More
Biggest risks for your enterprise through 2026

The risk landscape over the next five years: key trends

January 7, 2021

When planning for business continuity and resiliency through 2026, security and risk management professionals should pay attention to these trends.


Read More
get more out of your access control system

Get more out of your access control

Jonathan Lach
Jonathan Lach
December 29, 2020
Enterprises can increase the value of their access control by using these electronic security systems for more than just managing access at the front door.
Read More
First-ever Girls Scouts Supply Chain Patch for future female executives

Future female executives earn first-ever Girl Scouts' supply-chain patch

December 18, 2020

Girl Scouts of Tropical Florida (GSTF), Ryder System Inc. and the University of Tennessee's Global Supply Chain Institute partnered to create supply-chain curriculum for K-12.


Read More
Southeastern Rail Network in U.K. upgrades video surveillance to secure its sites

U.K.-based Southeastern Rail Network deploys video surveillance and analytics

December 18, 2020

One of the largest public train operators in the United Kingdom, Southeastern Rail Network, upgraded its analog legacy system to a smart video security solution for securing 12 train depots, including five unmanned locations, against theft and intrusion.


Read More
contact tracing solutions for your enterprise security coronavirus response

Contact tracing 101: Tips for enterprises

James Kingston
December 18, 2020

Contact-tracing solutions are often talked about as a COVID-19 response strategy for enterprises as they resume travel and continue business operations. In defining a digital contact tracing strategy, enterprises must decide whether or not they even need one distinct from efforts undertaken by local health authorities. Learn here how to implement a digital contact-tracing strategy, as well as how to sort through the large volume of options when it comes to contact tracing to determine what makes the most sense for your security team and your organization.


Read More
Extremism in the United States: where are the risks and what security enterprises can do regarding extremism

Extremism in the United States in 2021: What’s out there and where are the risks?

Dean C. Alexander
December 16, 2020

This article discusses extremism in the United States as we close out 2020 and look to 2021. Security professionals can educate themselves on what extremist groups are out there and where the risks lie.


Read More
two factor authentication will be replaced

Two factor authentication: Two steps forward, one step back

André Ferraz
December 15, 2020

With mobile usage a dominant channel going forward, authentication techniques need to move beyond two steps forward for authentication and one step backward for user experience. Just as passwords are being discarded because of the high friction they create for users, new multi-factor authentication techniques are moving in.


Read More
Respond to rogue drone incidents with these six steps

Six steps to control a rogue drone incident

Jeffrey Starr
December 8, 2020
How does the lifecycle of a rogue drone incident play out? Teach your security personnel these six steps to detect and mitigate drone incidents.
Read More
Manufacturing cybersecurity public private partnership

UTSA works to improve cybersecurity across manufacturing

December 7, 2020

The University of Texas at San Antonio (UTSA) launched the Cybersecurity Manufacturing Innovation Institute (CyManII), a $111 million public-private partnership. Led by UTSA, the university will enter into a five-year cooperative agreement with the U.S. Department of Energy (DOE) to lead a consortium of 59 proposed member institutions in introducing a cybersecure energy-ROI that drives American manufacturers and supply chains to further adopt secure, energy-efficient approaches, ultimately securing and sustaining the nation's leadership in global manufacturing competitiveness.


Read More
Previous 1 2 … 15 16 17 18 19 20 21 22 23 … 39 40 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing