Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Columns

Columns
Columns RSS Feed RSS

Business Continuity Plan

Your Mid-Year BCP Wake-Up Call: Is Your Business Ready?

A Business Continuity Plan is a silent safety net, but it requires regular maintenance.
Pam Nigro headshot
Pam Nigro
August 27, 2025

A Business Continuity Plan is a silent safety net, but it requires regular maintenance.


Read More
female technician in server room
Security Talk

Security Isn’t Static

Highlights from The Security Podcast
Rachelle Blair-Frasier, Editor in Chief
Rachelle Blair-Frasier
August 20, 2025

From leadership advice to explorations of emerging security threats, guests on The Security Podcasts share career stories for the good of the industry.


Read More
illustration of person at desk using computer for video call
Leadership & Management

Commanding from the Cloud

Security professionals discuss the role of leadership in a remote work environment.
Michael Gips
Michael Gips
August 18, 2025

Security professionals discuss the role of leadership in a remote work environment.


Read More
Customer retention concept
Career Intelligence

AI Algorithms Could Undermine Your Security Job Hunt

Use of AI is a double-edged sword for both job seekers and the companies looking to hire them.
Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
August 15, 2025

Use of AI is a double-edged sword for both job seekers and the companies looking to hire them.


Read More
Risk meter
Education & Training

Why Everyone Should Be Trained in De-Escalation

If the community trusts those that are tasked with enforcing its rules/laws, everyone is better off.
Andy Altizer, Westminster Schools & Georgia State University
Andy Altizer
Bill Hildebrand, BOS Security
Bill Hildebrand
Timothy S. Murphy, Kennesaw State University
Timothy S. Murphy
August 8, 2025

De-escalation is a valuable tool for teachers, front desk professionals, managers, and just about anyone that works with others.


Read More
Smart watch security

Securing the Digital Frontier: Strategies for Safeguarding Companies and Customers in the Age of Wearables

Adapting frameworks to encompass emerging risks associated with the latest wearable trends is essential.
Pam Nigro headshot
Pam Nigro
July 31, 2025

Adapting frameworks to encompass emerging risks associated with the latest wearable trends is essential.


Read More
Lynn Dohm

Breaking Barriers in Cybersecurity: A Conversation with WiCyS’s Executive Director

Lynn Dohm, Executive Director of nonprofit organization WiCyS discusses the importance of inclusion when solving the cybersecurity workforce gap.
Rachelle Blair-Frasier, Editor in Chief
Rachelle Blair-Frasier
July 28, 2025

Lynn Dohm, Executive Director of nonprofit organization WiCyS discusses the importance of inclusion when solving the cybersecurity workforce gap.


Read More
Emotion management and control

Navigating Behavioral Obstacles in Security Team Recruitment

What factors should be considered when adding senior security professionals for your team.
Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
July 25, 2025

What factors should be considered when adding senior security professionals for your team.


Read More
Unique businessman in crowd

When Does “Hands-Off” Become “Complacency?

Security professionals discuss what distinguishes effective laissez-faire leadership with complacent leadership.
Michael Gips
Michael Gips
July 25, 2025

Security professionals discuss what distinguishes effective laissez-faire leadership with complacent leadership.


Read More
Ribbon of data
Cyber Tactics

Quantum Computing: A Call to Action for Security Professionals

There are significant security challenges and opportunities ahead in the era of quantum computing.
Pam Nigro headshot
Pam Nigro
June 25, 2025

There are significant security challenges and opportunities ahead in the era of quantum computing.


Read More
Previous 1 2 3 4 5 6 7 8 9 … 45 46 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing