Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

Risk mitigation
Education & Training

Risk mitigation for domestic terrorism and radicalization

Maggie Shein
Maggie Shein
April 11, 2022

The risk of radicalization for private and public organizations is real. Security leaders can mitigate some risk by evaluating processes and procedures.



Read More
hospital door

Access control considerations for healthcare settings

Security Staff
April 8, 2022

The COVID-19 pandemic accelerated the adoption of security technologies and touchless solutions, according to the 2022 Health Care Trends Report from Allegion. Electronic access control plays a large role in hospital environments.


Read More
databases-freepik1170.jpg

Block confirms Cash app breach affecting 8m users

Maria Henriquez
April 8, 2022

Block confirmed the data breach that affected 8.2 million users was the result of data theft by a former employee. 


Read More
lucas moody headshot

Lucas Moody named SVP and CISO at Alteryx

Security Staff
April 8, 2022

Former Twitter security leader Lucas Moody has been named Chief Information Security Officer (CISO) and Senior Vice President at Alteryx.


Read More
Robin Andruss.jpg

Robin Andruss named Chief Privacy Officer at Skyflow

Maria Henriquez
April 8, 2022

Robin Andruss has joined Skyflow as Chief Privacy Officer to oversee data privacy and data protection commitments for enterprise, fintech, and healthcare organizations.


Read More
cybersecurity-controls-freepik1170x658.jpg

5 steps to strengthen cybersecurity defenses in wake of Ukraine-Russia crisis

Ivan Vinogradov
April 8, 2022

Five practical steps to increase an organization's security posture and resilience to protect against potential attacks related to the Ukraine-Russia crisis.


Read More
cyber attack

The success of cyber insurance lies in risk standardization

Saket Modi
April 8, 2022

Cyber insurance premiums are rising, and enterprise organizations looking into insurance have to meet various cybersecurity standards before gaining coverage. Standardizing risk measurements may help the industry stay protected in a time marked by rising cyberattacks.




Read More
the Great Resignation

The Great Resignation poses security concerns for organizations

Justin Fier
April 8, 2022

The Great Resignation opens the door to higher levels of insider threats, with ex-employees accidentally bringing enterprise data with them into new roles or intentionally introducing malware into a former employer's system. Here's how organizations can protect themselves from insider risk.


Read More
malware detection

3 ways to build cyber resilience post-ransomware attack

Jonathan Rajewski
April 8, 2022

After a ransomware attack or cyber extortion incident, businesses often go through the phases of grief. Navigating incident response and turning grief into resilience is paramount to building a strong organizational cyber defense.


Read More
small business SMB security

It’s time for SMBs to protect against ransomware

Jerry Hsieh headshot
Jerry Hsieh
April 8, 2022

Small and medium-sized business (SMB) security leaders must focus on tactics like encryption, cybersecurity awareness training and more to protect their enterprise data from cyberattacks. Learn the five common cyber mistakes made by SMBs and how to mitigate their effects.


Read More
Previous 1 2 … 204 205 206 207 208 209 210 211 212 … 561 562 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing