Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Columns

Columns
Columns RSS Feed RSS

SEC0818-news2-feat-slide_900px

GSX to Deliver Security’s Most Comprehensive Event

August 1, 2018

The Global Security Exchange (GSX) will provide access to valuable discussions, products and networking that security practitioners need to thrive.


Read More
Darrell K Royal (DKR)-Texas Memorial Stadium

How the University of Texas at Austin Secures 100,000-Fan Football Games

July 11, 2018

“For us, a game day activity is no small matter,” says James (Jimmy) Johnson, Assistant Vice President for Campus Safety at the University of Texas at Austin.

No kidding – Longhorn football games regularly sell out, hosting more than 100,000 fans in the Darrel K Royal (DKR)-Texas Memorial Stadium, not counting the small army of vendors, staff, security personnel and law enforcement that keep operations running smoothly.


Read More
Unconventional Security-July-2018

Unconventional Security: Managing Safety & Security for Conventions

July 9, 2018

The security industry’s calendar seems to revolve around a few key events: ISC West, ASIS International’s Global Security Exchange (GSX), ISC East… But have you ever considered how much effort goes into securing tradeshows and other large-scale events?


Read More
The Corner Office - july 2018

The Best Technology Ever Created

Phil Aronson
Phil Aronson
July 1, 2018

I love technology. My college degree is in math. I enjoy solving problems using technology. I love its disruptive nature. It can force us to rethink the way we do things. It changes us; how we think of ourselves, our families, our work and our society. It provides hope to the crippled, opportunities for the poor and disenfranchised, and healing for our environment. Its potential is a two-sided blade. It can harm us or help us. It can be used for good or evil.


Read More
Career IntelligenceJuly2018 SEC

Personal Branding and Your Career

July 1, 2018

Every security professional should plan their career objectives and develop a broad range of experience and competencies. This is a proven method for achieving your career goals. Development of a personal brand is equally important and should occur simultaneously. It will positively affect both your reputation and your marketability.


Read More
Millennial Security

ROI and Generation Z

diane-2016-200.jpg
Diane Ritchey
July 1, 2018

Mass notification systems (MNS), since becoming part of the Clery Act in 2010, are an integral part of how colleges and universities communicate with students and faculty. Security and police departments put in the time and effort to implement these notifications systems for important security situations.


Read More
What to Look for in Travel Security and Executive Protection Services - Security Magazine

What to Look for in Travel Security and Executive Protection Services

What are the components and challenges of a successful travel security program?
Sarah Ludwig
June 5, 2018
Here are some of the crucial elements of successful travel security programs.
Read More

Why We're Milling, and Why It's Wrong

diane-2016-200.jpg
Diane Ritchey
June 1, 2018
In an emergency situation, such as an active shooter, people will take several actions. They will seek information, they will prepare for evacuation and evacuate, and they will inform and help others. And then there’s milling.
Read More
How to Create an Effective Security Job Description - Security Magazine

How to Create an Effective Security Job Description

Brennan-2016-200px.jpg
Jerry J. Brennan
June 1, 2018
Development of a compelling job description is the first challenge to hiring the right candidate for any security job.
Read More
Revised NIST Cyber Security Framework - Security Magazine

5 Things You Need to Know about the Revised NIST Cybersecurity Framework

Chabinsky-2016-200px.jpg
Steven Chabinsky
June 1, 2018
To get you quickly up to speed, here’s a list of the five most significant Framework clarifications and revisions.
Read More
Previous 1 2 … 23 24 25 26 27 28 29 30 31 … 43 44 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing