Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

voice-freepik1170x658v5.jpg

The top 5 voice network vulnerabilities

roger northrop - mutare.jpg
Roger Northrop
August 3, 2022

Learn about the five main types of voice scams that can lead to data breaches, security vulnerabilities and loss of productivity for enterprise security.


Read More
cloud network security

Identity management in a multi-cloud environment

Siddharth Bhai
August 3, 2022

Managing enterprise identities in a multi-cloud environment presents a challenge to cybersecurity leadership. Discover identity and access management (IAM) best practices here.


Read More
drone shot of stadium

Challenges of sports stadium security

Madeline Lauver
August 2, 2022

The Venue Security Director Survey found safety challenges at stadiums across the MLB, NFL and more, prioritizing crowd management and security technologies.


Read More
school students

Delaware adopts statewide school emergency training

Madeline Lauver
August 2, 2022

Delaware schools have adopted statewide emergency response training focusing on reunification procedures after a school safety or security incident.


Read More
reporting-whistle-blower-freepik1170x658v5.jpg

Gartner: Compliance reporting needs new value proposition

Maria Henriquez
August 2, 2022

To drive a sense of personal responsibility among employees to report misconduct, Gartner says compliance teams need to address the benefits of reporting.


Read More
job contract

Michael Neuman named CISO at Backstop

Security Staff
August 2, 2022

Michael Neuman has been named the new Chief Information Security Officer (CISO) at Backstop Solutions Group.


Read More
costs-money-freepik1170x658v.jpg

The cost of a data breach averages $15m

Security Staff
August 2, 2022

The overall average cost of a data breach is now $15.01 million, according to new Black Kite research. 


Read More
telegram-freepik1170x658v.jpg

Telegram — the preferred method of anonymous communication among cybercriminals

Security Staff
August 2, 2022

Telegram has been growing in use among cybercriminals, Intel 471 found. 


Read More
training-skills-freepik1170x658v536.jpg

The cybersecurity skills gap highlights the need for cyber-awareness training

sandra-wheatley (2).jpg
Sandra Wheatley
August 2, 2022

With a significant cybersecurity skills gap and increasing cyberattacks, organizations need all the advantages they can get. A programmatic cyber-awareness training program is one such advantage.


Read More
healthcare-sec-freepik1170x658.jpg

Tenet Healthcare cyberattack cost $100 million

Security Staff
August 1, 2022

Tenet Healthcare reported it suffered a $100 million financial impact from a cyberattack, mostly caused by lost revenues and remediation costs.


Read More
Previous 1 2 … 141 142 143 144 145 146 147 148 149 … 559 560 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing