Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

5mw Goerres
Women in Security 2021 Edition

5 minutes with Kimber Goerres - Establishing technical security requirements

Maria Henriquez
August 6, 2021

Security spoke to Kimber Goerres, Security Systems Integration & Project Management Lead at Sony Electronics, who has served diligently in her role, ensuring the company’s error or down rate is nominal and establishing the technical security requirements for Sony offices globally. Here, Goerres speaks about her role, establishing technical security requirements and ensuring improved security levels through risk, vulnerability and audit assessments.


Read More
SEC0821-Covid-Yale-Feat-slide1_900px
COVID-19 Heroes

Yale University’s Public Safety Systems and Services team uses existing tech for robust COVID-19 response

By reimagining access control and use of existing system data, Yale’s Public Safety Systems and Services team was able to centralize and organize security technology operations, while providing further value across the entire university.
Maggie Shein
Maggie Shein
August 4, 2021

Once Yale University closed due to the pandemic in March 2020, the Public Safety Systems and Services team quickly realized that they could change the way access control was used and programmed across campus, while also streamlining security and operations.


Read More
SEC0821-Covid-Georgetown-Feat-slide1_900px
COVID-19 Heroes

Georgetown University’s Office of Emergency Management supports COVID-19 response

Marc Barbiere came to Georgetown about five months before the COVID-19 pandemic, taking over the recently-restructured Office of Emergency Management (OEM) in order to coordinate the University’s efforts to prepare for, respond to, and recover from emergencies.
Maggie Shein
Maggie Shein
August 4, 2021

Marc Barbiere came to Georgetown about five months before the COVID-19 pandemic struck with the goal of providing a robust framework for the University to prepare for, respond to, and recover from emergencies. Barbiere and the newly restructured Office of Emergency Management put together a framework to streamline and organize emergency and pandemic response to continue operations no matter the cause of disruption.


Read More
Adjusting remote work polices in the future will prepare companies for next wave of threats

Adjusting remote work polices in the future will prepare companies for next wave of threats

Richard Bird
August 4, 2021

There are a number of steps companies can take to better prepare and protect themselves from the next-generation of post-COVID cyberthreats.


Read More
SEC0821-cyber-Feat-slide1_900px
Cyber Tactics

Emerging technology, evolving threats — Part I: Quantum computing

John McClurg
John McClurg
August 2, 2021

As technology grows and advances, potential cyber threats grow with it. While this notion is nothing new, the current speed of innovation makes it more important than ever to consider the implications these developments will have on our cybersecurity capabilities — especially with cybercriminals becoming more sophisticated and more adept at using emerging blind spots to their advantage.


Read More
SEC0821-Cover-Feat-slide1_900px

Top de-escalation strategies and training for security leaders

Security and de-escalation are often intertwined. Learn how security pros implement best-in-class de-escalation strategies.
Adam Stone
August 2, 2021

De-escalation is a key frontline security strategy in a range of situations, from hospitals to retail settings to office environments. Many sectors, such as travel and airlines, healthcare facilities, retail and more, have seen an increase in agitated behavior or violent incidents in recent years, some spawned from tensions rising regarding mask mandates and COVID-19 protocols. Here, we take a look at de-escalation strategies and training that security leaders can implement within their organizations to keep security, staff and visitors safe.


Read More
Protecting critical infrastructure and utilities as European Nations

100-day plan: What European nations can do to protect utilities

Andrew Hollister
Andrew Hollister
July 30, 2021

Secure and reliable utility operations are vital to national security across the globe. The frequency of attacks on critical infrastructure is rapidly rising, not just in the U.S., but across the globe. Here’s what security leaders can do to protect utilities.


Read More
data-protection-freepik

Data privacy in the era of COVID-19 vaccine rollouts

Drew Daniels Elizabeth Schweyen
July 28, 2021
Organizations are also navigating an increasingly complex regulatory landscape where failure to comply can and has led to costly fines, a damaged corporate reputation, and lost business opportunities. Data has truly proven to be an invaluable asset, but also an unbounded risk if not properly managed.
Read More
workplace-security-freepik

Powering the office of the future with a security ecosystem

matthew kushner
Matthew Kushner
July 27, 2021

As organizations re-evaluate their office spaces, leveraging security solutions will be critical to addressing three key areas: improving employee health and safety; enhancing business efficiencies; and, proactively solving business challenges.


Read More
facial-recognition-access control freepik

Turning security into a frictionless experience

rick-focke
Rick Focke
July 27, 2021

Now, user experience is at the forefront of the evolution of security technology, with devices being developed that both enhance and simplify the way in which people interact with security solutions.   One significant advancement for the security industry has been the development and introduction of frictionless access control technology – a solution that alters and simplifies the overall user experience.


Read More
Previous 1 2 … 147 148 149 150 151 152 153 154 155 … 307 308 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing