Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

SEC0420-whistleblower-Feat-slide1_900px

The Value of Whistleblowing and Hotline Reporting

New research is changing how enterprises think about whistleblowing.
Kyle Welch
April 16, 2020

New research is changing – or at least, should be changing – how enterprises think about whistleblowing. What are some lessons enterprises need to take to heart regarding the value of hotline reporting?


Read More
Wireless video

Enhancing Physical Security with Wireless Video

How can improvements in wireless video enhance the physical security of your facilities?
Adam Stone
April 15, 2020

When it comes to wireless video surveillance, security professionals face no end of hurdles.


Read More
covid-19 survey

Survey Shows How the Security Industry is Mitigating Risk during COVID-19

Maria Henriquez
April 14, 2020

How is the enterprise security industry working to keep facilities and employees safe? What new challenges do you face each day, particularly as employees work from home offices?  In new research, Security Magazine and Clear Seas Research, a BNP Media company, examines the impact of the pandemic on the industry. 


Read More
Meeting

How to Minimize Cybersecurity Failure? Plan for it

'If you fail to plan, you are planning to fail'
Eric Welling
Eric Welling
April 14, 2020

While there’s some debate whether Benjamin Franklin or someone else said it first, the advice remains solid for the modern cyber landscape. Yet, in today’s competitive environment, not only is planning critical — but so, too, is planning for plans to fail.


Read More
data privacy

The California Consumer Privacy Act Has Data Security at its Core

Courtney Zucker
Courtney Zucker
Marc Voses
Marc Voses
April 13, 2020
The CCPA has forced enterprises to rethink the types of personal information they collect and share, and the policies and procedures they implement to safeguard that data. Are enterprises prepared for the CCPA?
Read More
domestic violence

Managing Domestic Violence in a Work at Home World

The Struggle Can Be Real
Vutsinas
Amanda Vutsinas, MPA, CPP
April 10, 2020

Every year, according to a Justice Department study, approximately 18,700 violent workplace events are committed by an intimate of the victim: a current or former spouse, lover, partner, or boyfriend/girlfriend.


Read More
Security conferences

Security Conferences in 2020: What’s Canceled, Postponed, Going Virtual or Proceeding as Planned?

Maria Henriquez
April 9, 2020

Which security conferences have been canceled, postponed or going virtual in 2020 due to the coronavirus? Here is a list of security conferences for cybersecurity and physical security professionals, that are still proceeding as planned, going virtual or that have been postponed or canceled. 


Read More
Telecommute 2

Beyond COVID-19: Six Ways to Secure Remote Workers

Ken Ammon
Ken Ammon
April 9, 2020

The COVID-19 pandemic has turned worldwide social and business interactions upside down, stoking fear and panic everywhere from main street to Wall Street.


Read More

The Rise of the Chief Cybercrime Officer

Matt Cable
Matt Cable
April 8, 2020

The TalkTalk data breach in 2015 was monumental for the cybersecurity industry. At the time, data breaches were hardly new, but this particular breach resulted in the government recommending that an officer should be appointed with day-to-day responsibility for protecting computer systems from a cyber attack. 

 


Read More
SEC0420-ces-Feat-slide1_900px

CES Unveils Array of Security Technologies

If CES is any indication, artificial intelligence, drones, robots and more will soon be everywhere.
Michael Gips
Michael Gips
April 8, 2020

Learn how artificial intelligence, drones, detection systems and more shown at this year’s Consumer Electronics Show are now working their way into many security applications.


Read More
Previous 1 2 … 217 218 219 220 221 222 223 224 225 … 307 308 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing