Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Education & Training

Security Education & Training
Security Education & Training RSS Feed RSS

cyber security freepik

The big problem with bad cyber analogies

Gentry Lane
July 16, 2021
Because cybersecurity events are complicated, we rely on analogies to understand how they work. Analogies are useful, but certain oversimplifications are perpetuating inaccurate narratives. These inaccuracies misdirect productive discussion and as a result, proposed policy and solutions are being based on faulty assumptions. A faulty premise can only yield flawed results…and cyber national security is not an area in which the United States has margin for error.
Read More
optimizing your security team without micromanaging

Regulating patrols and processes without micromanaging your security team

Kim Brown
July 16, 2021

Security managers have the difficult challenge of making sure each of their employees is doing their job properly, even though they are in different locations and must perform different duties. An integrated security approach that includes simple, reliable technology tools can minimize human error and streamline security patrols and processes. 


Read More
Matt Lewis joins Community Hospital as Director of Security

Community Hospital in Colorado hires Matt Lewis as Director of Safety and Security

July 15, 2021

The Community Hospital in Grand Junction, Colorado has hired soon-to-be-retired Mesa County Sheriff Matt Lewis as Director of Safety and Security. 


Read More
Lauren Zink Women in Security podcast

Listen to Lauren Zink, Security Program Awareness Manager at Oportun in the latest Women in Security podcast

July 15, 2021

Listen to Security's latest Women in Security podcast with Lauren Zink, Security Awareness Program Manager at Oportun,


Read More
Harper College joins NIPAS

Harper College joins NIPAS mobile field force for coordinated response

July 14, 2021

The Harper College Police Department has joined the Northern Illinois Police Alarm System Mobile Field Force (NIPAS). 


Read More
Rhode Island College earns accreditation

RIC Campus Police achieve state accreditation

July 14, 2021

The police department of Rhode Island College is now one of 30-plus accredited police agencies in Rhode Island.


Read More
women in security

Women in security: A guiding force

Adam Brown
July 14, 2021

How often do you consider gravity? And the power of this invisible force to move oceans, hold planets in orbit, and quite literally, keep us all grounded. Now, how about women in technology? Another force of nature that, I think, deserves more visibility and recognition. Men haven’t cornered the market on technological genius, innovation, and invention. But too often, women have had to work all the harder not only to prove that fact, but also to be equally recognized for their extraordinary contributions.


Read More
DevOps-freepik

Cloud security should never be a developer issue

Shira Shamban
Shira Shamban
July 14, 2021
I dare to say this: “companies need to stop playing the game of pin the blame on the developer whenever a security vulnerability is discovered or exploited in applications.” Rather than pointing fingers at developers, organizations need to empower these professionals to help them build and expand their cloud-based initiatives without having to worry about security.
Read More
SEC0721-Edu-Feat-slide1_900px
Education & Training

COVID-19 brought all hands on deck: Why we need to keep it that way

Bruce McIndoe
Bruce McIndoe
July 14, 2021

Duty of Care spells out responsibilities an organization has for its people. This includes making the workplace safe, preventing risks to health, and ensuring safe working practices are set up and followed. There is a lot to deal with between these areas and the onus is on a variety of managers to ensure nothing falls between those cracks.


Read More
id-card-access-control-freepik

How visitor management, access control and security innovations are reshaping the look and feel of work in enterprises

stephen bishop
Stephen Bishop
July 13, 2021
Today, the world’s leading enterprises are going even further to unlock greater efficiencies and new and innovative capabilities well beyond the original security functions. The most sophisticated implementations of visitor management and access control are affecting many more stakeholders of the business – and it looks like it’s only the beginning.
Read More
Previous 1 2 … 97 98 99 100 101 102 103 104 105 … 232 233 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Code

Security Leaders Discuss the Marquis Data Breach

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing