Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

artificial intelligence a security practitioner's roadmpa

A security practitioner’s roadmap to artificial intelligence

Dan Dunkel
Dan Dunkel
July 19, 2021

Artificial Intelligence impacts the physical security industry directly when you consider that surveillance cameras are the ultimate end-point device, the “all-seeing eyes” of the Internet. Could “intelligence” be applied to optimize security operations? Learn from one security leader’s experience using AI to reduce tailgating and streamline security operations.


Read More
SEC0721-ProdSpot-Feat-slide1_900px
Product Spotlight

Product spotlight on IP video surveillance

A sampling of the latest IP video surveillance solutions.
Maria Henriquez
July 16, 2021

Switching from analog to IP-based cameras can offer more reliable security and added value for your business, providing higher resolutions to cover larger areas or get more detailed images to meet identification requirements to deliver vital business data and increase surveillance efficiency, all with potential for integration. Here is a sampling of the latest IP video surveillance solutions.


Read More
optimizing your security team without micromanaging

Regulating patrols and processes without micromanaging your security team

Kim Brown
July 16, 2021

Security managers have the difficult challenge of making sure each of their employees is doing their job properly, even though they are in different locations and must perform different duties. An integrated security approach that includes simple, reliable technology tools can minimize human error and streamline security patrols and processes. 


Read More
SEC0721-Edu-Feat-slide1_900px
Education & Training

COVID-19 brought all hands on deck: Why we need to keep it that way

Bruce McIndoe
Bruce McIndoe
July 14, 2021

Duty of Care spells out responsibilities an organization has for its people. This includes making the workplace safe, preventing risks to health, and ensuring safe working practices are set up and followed. There is a lot to deal with between these areas and the onus is on a variety of managers to ensure nothing falls between those cracks.


Read More
reimagining biometric access for customer authentication

Using biometrics to reinvent customer authentication

Simon Marchand
July 14, 2021

AI-enabled biometrics can help in the fight against deception for its ability to authenticate customers securely and accurately over the phone.


Read More
SEC0721-Talk-Feat-slide1_900px
Security Talk

Fostering a healthy workplace environment in the aftermath of trauma

Maggie Shein
Maggie Shein
July 13, 2021

Security teams of all sectors face incidents of violence, anxiety, escalation and trauma during their careers. For a security leader, fostering a healthy workplace environment following trauma or helping managers and frontline security personnel navigate such incidents is particularly essential to healing, reducing turnover, and allowing everyone in the workplace to feel heard, respected and confident.


Read More
SEC0721-Tenant-Feat-slide1_900px
Integrated Solutions

Identity management for multi-tenant buildings

Identity and access management within a multi-tenant setting can be time-consuming, costly and risk-intensive without the right tools.
Brooke Grigsby
Brooke Grigsby
July 12, 2021

Trends in the industry are making identity management requirements in apartment and multi-tenant facilities all the more demanding. A new generation of solutions that offer dynamic identity provisioning on mobile devices offer a way forward — enabling universal, trackable access to all spaces for all users coming and going.


Read More
SEC0721-Pentesting-Feat-slide1_900px
Enterprise Services

Four ways to optimize your red team operations

If done right, red teams put an organization’s security controls, policies, response and training to the test using the tactics, techniques and procedures (TTPs) of real-world adversaries, providing value to any security program.
Brady Bloxham
Brady Bloxham
July 12, 2021

Red teams put an organization’s security controls, policies, response and training to the test using the tactics, techniques and procedures (TTPs) of real-world adversaries. It is an essential activity in any security program, but it only provides value if done right.


Read More
SEC0721-CSO-Feat-slide1_900px

The first 90 days of a Chief Security Officer

New Chief Security Officers who approach the role with a strong focus on understanding organizational culture for the first 90 days are likely to enjoy success. Here, CSOs provide advice on how to start off on the right foot.
Maria Henriquez
July 9, 2021

The first 90 days of a Chief Security Officer in an organization are critical for his/her success or failure in the new position. Successful individuals will be the ones who establish trusting relationships, learn the organizational culture, and lay the ground foundation for a security program.


Read More
SEC0721-WIS-Companion-Feat-slide1_900px

A glimpse of women in the security sector today

A new generation of young professionals are joining the industry who may not have considered security as a career path previously thanks to others that have paved the way through their dedication and successes.
SEC0721-WIS-Companion-slide2_900px
Mimi Lanfranchi
July 8, 2021

Security is one of the fastest-growing professional careers worldwide. Career prospects range from entry-level security officer and administrative positions to system integration specialists and private investigators to directors of security at corporations and organizations around the world. While security is not traditionally a sector that most women considered to build their careers, the landscape has shifted dramatically.


Read More
Previous 1 2 … 154 155 156 157 158 159 160 161 162 … 312 313 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Red block among white blocks

Plenty of Associations, But Not Enough Association

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing