Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

SEC0321-Perimeter-Feat-slide1_900px
Integrated Solutions

Securing the perimeter

When it comes to perimeter security, strong upfront planning and swift real-time reactions supported by technology can go a long way in helping an enterprise secure its outermost layer.
Adam Stone
March 8, 2021

How can security leaders be sure to shore up that outermost barrier at their organizations? When it comes to perimeter security, strong upfront planning and swift real-time reactions supported by technology can go a long way in helping an enterprise secure their most important assets.


Read More
5 minutes with Webster-Jacobsen

5 minutes with Bryce Webster-Jacobsen - What the new CMMC Framework means for defense contractors

Maria Henriquez
March 8, 2021

GroupSense’s director of intelligence operations Bryce Webster-Jacobsen outlines the U.S. Department of Defense’s Cybersecurity Maturity Model Certification’s Impact on Defense Contractors.


Read More
SEC0321-Campus-Feat-slide1_900px
Security Strategies

Campus safety challenges in a post-2020 world, strategies for success

The year 2020 presented society and the campus community with very difficult and unique challenges. Let’s take a look at a practical, fiscally responsible approach that security leaders can implement to maintain traditional services and respond to unique challenges, all while preparing for the unexpected.
Gregory Richter
Gregory Richter
March 5, 2021

Campus police and security teams are tasked with not only providing a professional and measured response to volatile and politically charged issues, but must still maintain traditional, expected and valuable services, all within budgets that, for many campus security teams, will probably not be increasing. Let’s take a look at practical security practices campus safety leaders can implement.


Read More
SEC0321-Leadership-Feat-slide1_900px
Leadership & Management

Humor in leadership? Funny you should ask

Sometimes it’s better to disarm than to arm. Put another way, humor can be both a powerful leadership and tactical tool for security.
Michael Gips
Michael Gips
March 3, 2021

Humor is tricky business in the security world, however. Briefing staff on warning signs of workplace violence, precursors of terrorist attacks, contingency plans for natural disasters, and methods of corporate espionage doesn’t exactly lend themselves to one-liners. Dealing with most security incidents isn’t a laughing matter.


Read More
SEC0321-Career-Feat-slide1_900px
Career Intelligence

Diversity in corporate security

Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
March 3, 2021

Unfortunately, diversity is still underrepresented in security. Our profession continues to struggle to attract and/or advance diverse candidates into leadership ranks in numbers that accurately represent a cross section of the working population.


Read More
SEC0321-Burnout-Feat-slide1_900px
Leadership and Your Security Career

Secure your mask before others: Preventing security burnout

Steven Antoine 3
Steven Antoine
March 3, 2021

Left attempting to optimize security teams while struggling to cope with multiple crises simultaneously, security leaders feel as if almost 75% of the workday is spent battling internal bureaucracy, while 25% is spent dedicated to the issues that require attention. But you’re not alone. To start, have some real conversations with your staff, and don’t forget to focus on yourself and your own well-being.


Read More
SEC0321-Cover-Feat-slide1_900px
Special Report

The 2021 Top Cybersecurity Leaders

Nominated by their colleagues and associates, these top cybersecurity executives are changing the cybersecurity landscape for the better.
Maria Henriquez
March 1, 2021

Security magazine is pleased to present our inaugural Top Cybersecurity Leaders for 2021. Security partnered with (ISC)², the world’s leading cybersecurity professional organization, to find enterprise information security executives who have made and continue to make significant contributions in the cybersecurity space to their organizations and the security profession. They were nominated by their colleagues and associates, and were chosen based upon their leadership qualities and the overall positive impact that their cybersecurity projects, programs or departments have had on their shareholders, organizations, colleagues and the general public.


Read More
SEC0321-Cyber-Feat-slide1_900px
Cyber Tactics

Highly skilled & well-funded: The new booming threat in cybercrime

John McClurg
John McClurg
March 1, 2021

Someone of a cynical persuasion may think it was only a matter of time until ‘outsourcing’ came to the cybercrime business. While this inevitability may be debatable, the early success of the model certainly isn’t.


Read More
Patient care can garner extra value with video surveillance and artificial intelligence in the healthcare setting

AI moves beyond physical security to patient care

Dr. Harro Stokman
February 28, 2021

Repurposing video surveillance and artificial intelligence and analytics traditionally used for security initiatives within the healthcare space can increase positive patient interactions and bring additional value to your current electronic physical security solutions.


Read More
5 mins with Strakhov

5 minutes with Sergey Strakhov – Preparing for “Q-day”

Maria Henriquez
February 26, 2021
Quantum computing, the use of quantum phenomena such as superposition and entanglement to perform computation, is expected to impact many sectors, including healthcare, energy, finance, entertainment, and security. Before this large-scale impact is achieved, several challenges need to be overcome, and security leaders should start preparing for this change, says Sergey Strakhov, Chief Technology Officer at IronCap. Here, we talk to Strakhov about the impact quantum computing will have on security and the potential risks it poses.
Read More
Previous 1 2 … 170 171 172 173 174 175 176 177 178 … 306 307 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing