Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

Data security data privacy public data

Curbing cybersecurity risks at the core with public online data collection

Omri Orgad
August 10, 2021

It is more critical than ever to prioritize fixing vulnerabilities to combat attacks and preserve valuable data by using advanced comprehensive technologies and solutions.


Read More
SEC0821-Travel-Feat-slide1_900px

New risks, new regulations: Best practices for travel security in 2021

Stay ahead of the new travel landscape with these safety and risk management best practices.
Harriet Brennan
Harriet Brennan
August 9, 2021

The COVID-19 pandemic has significantly changed the travel landscape, impacting the responsibilities and requirements of employers and travel managers. Now more than ever, it is critical for organizations to ensure that they have a robust travel security program in place, to support their Duty of Care agenda and take into consideration best practice travel risk management.


Read More
SEC0821-GSOC-Feat-slide1_900px

Three elements of a successful GSOC

For a Global Security Operations Center (GSOC) to be successful in today’s threat landscape, it must include these three key elements in its design.
Patrick Brosnan
August 9, 2021

A useful GSOC is one that understands the problem a company wants to solve so that the data collection requirements and analytics are relevant and staff with the right expertise are in place. If you think that establishing a GSOC is the next step for your enterprise, three key elements will determine its success.


Read More
SEC0821-Covid-Broad-Feat-slide1_900px
COVID-19 Heroes

Broad Institute Security Department supports COVID-19 testing facility

The Broad Institute of MIT and Harvard has served as one of the largest processors of COVID-19 tests in the country. The Security Team has supported these efforts in myriad ways, helping maintain business continuity and ensure campus safety, visitor management, and compliance with COVID-19 safety protocols.
Maria Henriquez
August 6, 2021

The Broad Institute of MIT and Harvard has served as one of the largest processors of COVID-19 tests in the country. The Security Team has supported these efforts in myriad ways, helping maintain business continuity and ensure campus safety, visitor management, and compliance with COVID-19 safety protocols.


Read More
SEC0821-Covid-Grocers-Feat-slide1_900px
COVID-19 Heroes

Associated Grocers of New England’s Risk Management and Loss Prevention teams step up amid pandemic

While enterprises around the globe were shutting down and moving to remote work, frontline food suppliers, transport companies and grocery stores didn’t have that ability. AGNE needed to continue to distribute product to independent grocer members as well as its own stores throughout New England and New York, while also dealing with increased freight and procurement demands into the facility.
Maggie Shein
Maggie Shein
August 6, 2021

As a critical business, Associated Grocers of New England needed to continue distribution to independent grocer members as well as its own stores throughout New England and New York, while also managing increased freight and procurement demands into the facility during the beginning of the pandemic. The organization’s Risk Management and Loss Prevention teams stepped up to help.


Read More
5mw Goerres
Women in Security 2021 Edition

5 minutes with Kimber Goerres - Establishing technical security requirements

Maria Henriquez
August 6, 2021

Security spoke to Kimber Goerres, Security Systems Integration & Project Management Lead at Sony Electronics, who has served diligently in her role, ensuring the company’s error or down rate is nominal and establishing the technical security requirements for Sony offices globally. Here, Goerres speaks about her role, establishing technical security requirements and ensuring improved security levels through risk, vulnerability and audit assessments.


Read More
SEC0821-Covid-Yale-Feat-slide1_900px
COVID-19 Heroes

Yale University’s Public Safety Systems and Services team uses existing tech for robust COVID-19 response

By reimagining access control and use of existing system data, Yale’s Public Safety Systems and Services team was able to centralize and organize security technology operations, while providing further value across the entire university.
Maggie Shein
Maggie Shein
August 4, 2021

Once Yale University closed due to the pandemic in March 2020, the Public Safety Systems and Services team quickly realized that they could change the way access control was used and programmed across campus, while also streamlining security and operations.


Read More
SEC0821-Covid-Georgetown-Feat-slide1_900px
COVID-19 Heroes

Georgetown University’s Office of Emergency Management supports COVID-19 response

Marc Barbiere came to Georgetown about five months before the COVID-19 pandemic, taking over the recently-restructured Office of Emergency Management (OEM) in order to coordinate the University’s efforts to prepare for, respond to, and recover from emergencies.
Maggie Shein
Maggie Shein
August 4, 2021

Marc Barbiere came to Georgetown about five months before the COVID-19 pandemic struck with the goal of providing a robust framework for the University to prepare for, respond to, and recover from emergencies. Barbiere and the newly restructured Office of Emergency Management put together a framework to streamline and organize emergency and pandemic response to continue operations no matter the cause of disruption.


Read More
Adjusting remote work polices in the future will prepare companies for next wave of threats

Adjusting remote work polices in the future will prepare companies for next wave of threats

Richard Bird
August 4, 2021

There are a number of steps companies can take to better prepare and protect themselves from the next-generation of post-COVID cyberthreats.


Read More
SEC0821-cyber-Feat-slide1_900px
Cyber Tactics

Emerging technology, evolving threats — Part I: Quantum computing

John McClurg
John McClurg
August 2, 2021

As technology grows and advances, potential cyber threats grow with it. While this notion is nothing new, the current speed of innovation makes it more important than ever to consider the implications these developments will have on our cybersecurity capabilities — especially with cybercriminals becoming more sophisticated and more adept at using emerging blind spots to their advantage.


Read More
Previous 1 2 … 146 147 148 149 150 151 152 153 154 … 306 307 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing