Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Columns

Columns
Columns RSS Feed RSS

Are Degrees What They Seem?, Security Magazine October 2017 Career Intelligence

Are Security Degrees What They Seem?

Brennan-2016-200px.jpg
Jerry J. Brennan
October 1, 2017
Acquiring a higher-level education is time consuming and expensive, and fraudsters have long been marketing fast-track ways to obtain what appears to be an impressive diploma, at least on the surface. These programs and methods have been around for many years; therefore, it is not always easy to identify what is real and what is a wasted investment of your money and time.
Read More
Culture First, Technology Third, Security Magazine October 2017 Corner Office

Culture First, Technology Third

Phil Aronson
Phil Aronson
October 1, 2017
The bottom line: Culture is another way of saying “This is how we do things around here.” In most cases, what is written down or hung on the wall does not align with “how we do things around here.” People will perform their roles, work within their processes and utilize technology to get things done; but the values that undergird their behavior and the ability to understand them and leverage them is one of the keys to unlocking the value of security.
Read More
Where Opportunity Knocks

Where Opportunity Knocks

diane-2016-200.jpg
Diane Ritchey
September 1, 2017

It’s not working, but it can. Despite government and private sector efforts to retain more women in the global cybersecurity profession, women are sorely underrepresented in the industry.


Read More
Increasing Liability for Enterprises

Increasing Liability for Enterprises: Terrorism, Civil Unrest, Kidnappings, Crime, Natural Disasters

Mattice-2016-200px.jpg
Lynn Mattice
September 1, 2017
The world has become significantly more dangerous for business travelers and especially for those who are given short or long-term assignments away from their home base of operations. Dramatic changes in conditions across the domestic landscape as well as across the world have driven significant enhancements to corporate travel security programs.
Read More
Recruiting for Security Leadership Success

Recruiting for Security Leadership Success

Brennan-2016-200px.jpg
Jerry J. Brennan
September 1, 2017
Companies increasingly want a better understanding of what contributes to predicting performance in possible new hires. They want to better understand a candidate’s motivation, values, beliefs and goals in addition to their competencies. This allows the hiring organization to better assess whether there are personality characteristics and traits that, when pushed to extremes, will impede the individual’s ability to be effective in executing the responsibilities of the position.
Read More
Leadership and Culture

Leadership and Culture

Phil Aronson
Phil Aronson
September 1, 2017
As a leader, you get very few opportunities to create a culture of discipline around the goals and vision for your team. Over the last few years, this core leadership trait of “engagement” has become an imperative. How can you invite your employees into your vision and mission and have them make it their own?
Read More
How New York is Shaking Up Cybersecurity

How New York is Shaking Up Cybersecurity

Chabinsky-2016-200px.jpg
Steven Chabinsky
September 1, 2017
Something potentially groundbreaking is happening in New York, and its impact is being felt globally. Still, if you’re not in the financial services industry, and specifically regulated by the New York State Department of Financial Services (NYDFS), you may have missed it. What is this change? In short, it’s the first of what may become a wave of stringent state cybersecurity regulations that impose “minimum standards” on industry.
Read More
Countering the Effects of New Age Terrorism on Business and Travel

Countering the Effects of New Age Terrorism on Business and Travel

Michael Payne
Michael Payne
September 1, 2017
What is ‘new age’ terrorism? In a paper addressing changes in terrorism, Dr. Arvind Adityaraj states: “…the magnitude of violence, lethality and the extensive use of technology to disseminate ideology, indoctrinate, and mold the mind of the youth in their fold…[with] business-like network structures clearly point towards the significant departure of old terrorism.”
Read More
Pet Insurance, Sabbaticals, A Luggage Party… Work Perks for Employees

Pet Insurance, Sabbaticals, A Luggage Party… Work Perks for Employees

diane-2016-200.jpg
Diane Ritchey
August 1, 2017

Research from Glassdoor found that 57 percent of people said benefits and perks are among their top considerations before accepting a job, and four in five workers say they would prefer new benefits over a pay raise.


Read More
Why Do So Many Focus on Black Swans?

Why Do So Many Focus on Black Swans?

The Flocks of White Swans and Grey Swans Are What You Really Need to Pay Attention To!
Mattice-2016-200px.jpg
Lynn Mattice
August 1, 2017

Emergency Response, Disaster Recovery, Business Continuity, Crisis Management and the latest and all-encompassing buzzword – Enterprise Resilience.


Read More
Previous 1 2 … 29 30 31 32 33 34 35 36 37 … 45 46 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing