Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

access control/mental health genetec

How Access Control Data can Support Mental Health on Campus

terry schulenburg
Terry Schulenburg
October 8, 2019
For many students, the stress of school goes beyond academic achievement or financial pressure. Increasingly, students are also dealing with mental health issues as they pursue their post-secondary education. A recent survey of 19 colleges across eight countries published by the American Psychological Association found that one third of students identified as having at least one mental health challenge, including depression or generalized anxiety.
Read More

Physical Security Sector’s Mission to Hire Veterans

Steve Jones #2
Steve Jones
October 8, 2019

As CEO of Allied Universal, I believe that veterans, service members and reservists are unsung heroes who serve, secure and care for the people and communities in every corner of our world.


Read More
SEC1019-profile2-Feat-slide1_900px

Driving K-12's Digital Security and Privacy

How does the Leander, Texas Independent School District ensure the protection of their students' data?
Maria Henriquez
October 7, 2019

Amid headline-generating K-12 data breaches, the Leander, Texas Independent School District is ensuring its student data practices remain innovative.


Read More
Here, a CDC healthcare worker takes the proper measurements to ensure that she is protected in an Ebola clinic in West Africa - Security Magazine

Don’t Forget Biological Threats

Daniil Davydoff
Daniil Davydoff
October 3, 2019

From the standpoint of risk analysis, recency bias—that is, an overwhelming focus on events that have happened most recently—is one of the most nefarious psychological blinders.


Read More
SEC1019-profile1-Feat-slide1_900px

Managing Risk and Threats at the Exelon Corporation

Meet Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at the Exelon Corporation.
diane-2016-200.jpg
Diane Ritchey
October 3, 2019

How is Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at Exelon Corporation, mitigating and managing risk on a daily basis?


Read More
SEC1019-Cover-Feat-slide1_900px

Critical Infrastructure Security and Resilience - Today and Tomorrow

The Cybersecurity and Infrastructure Security Agency's mission is extensive: to help secure the nation's critical infrastructure from physical and cyber threats, and to create a more secure and resilient infrastructure for the future.
diane-2016-200.jpg
Diane Ritchey
October 1, 2019

Meet the Department of Homeland Security's newest agency - the Cybersecurity and Infrastructure Security Agency - that will serve as the pinnacle for national risk management for cyber and physical infrastructure.


Read More
SEC1019-cyber-Feat-slide1_900px
Cyber Tactics

AR and VR: How Immersive Technology Is Bringing Cybersecurity Scenarios to Life

John McClurg
John McClurg
October 1, 2019

While VR and AR have different fortes, both enhance and accelerate experiential learning that can help manifest and reinforce a culture of cybersecurity across industries. It is technology implications like this that will help propel cybersecurity awareness into a state of mass awareness.


Read More
SEC1019-career-Feat-slide1_900px
Career Intelligence

Privacy - An Emerging Security Career Challenge

Brennan-2016-200px.jpg
Jerry J. Brennan
October 1, 2019

An emerging challenge facing security leaders involves governance related to the collection, storage and transmission of personal information and the ethical utilization of it. While there are compliance programs currently in place that govern the protection of individual medical and financial data, there are clearly additional challenges on the horizon.


Read More
SEC1019-talk-Feat-slide1_900px
Security Talk

Have You Chosen the Right Person to Lead Your SOC?

diane-2016-200.jpg
Diane Ritchey
October 1, 2019

Enterprises are struggling to find the right talent to safeguard their networks; therefore, they must change their mindsets and begin recruiting talent from non-traditional backgrounds to ensure they have the "right" person on their SOC team.


Read More
data-center

What Happens When 'Tool Sprawl' Makes IT Security Operations Too Complex

scott gordon
Scott Gordon
September 30, 2019
Enterprises today have become increasingly reliant on mobile workers and flexible working lifestyles. Plus, they are opening internal resources to outside users, including contractors, partners and service providers.
Read More
Previous 1 2 … 236 237 238 239 240 241 242 243 244 … 310 311 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing