Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

corruption-g61535d671_1280.png

How to Spot Fake News

Security Staff
March 3, 2022

Spotting propaganda and fake news is essential for security awareness, security leaders, employees and organizational stakeholders alike.


Read More
enterprise data

Data: The future of quantifying risk

Yair Kuznitsov
March 3, 2022

By using real-time data to predict enterprise risk, security leaders can mitigate future physical and cyber threats to their organizations.


Read More
parking-freepik1170x658.jpg

Ohio State improves surveillance and safety in parking garages

Maria Henriquez
March 2, 2022

The Ohio State University will begin installing surveillance cameras and license plate reader cameras this week at the Ohio Union garages. 


Read More
train riders

SEPTA adds transit guides to improve passenger safety

Security Staff
March 2, 2022

The Southeastern Pennsylvania Transit Authority (SEPTA) will add up to 88 safety guides to its system, aiming to improve passenger safety onboard and in transit stations.


Read More
Don Pecha headshot

Don Pecha appointed Senior Director of Information Security at FNTS

Security Staff
March 2, 2022

Cybersecurity leader and former Chief Information Security Officer (CISO) Don Pecha has been named the Senior Director of Information Security at FNTS.


Read More
DevOps-freepik1170x658x5.jpg

API attacks increased 681% in the last 12 months

Security Staff
March 2, 2022

The majority (95%) of organizations have experienced an API security incident in the past 12 months, according to Salt Security’s Salt Labs State of API Security Report, Q1 2022.


Read More
hacker scammer

$5.9 billion lost due to fraud in 2021

Madeline Lauver
March 2, 2022

Identity theft and imposter scams were some of the top fraud techniques employed by scammers to defraud users out of $5.9 billion in 2021, according to data from the Federal Trade Commission (FTC).


Read More
phishing

4 tips for launching a simulated phishing campaign

Ellen M. Sturgeon head shot1569363024691 (1).jpg
Ellen M. Sturgeon
March 2, 2022

A cybersecurity tactic to reduce ransomware and increase security awareness: simulated phishing campaigns. Here are four considerations for enterprise security leaders thinking about adopting the cyber defense technique.



Read More
alert-freepik1170x658.jpg

Wiperware (pseudo ransomware) used in Ukraine cyberattacks

matt-warner.jpg
Matthew Warner
March 2, 2022

As tensions flare between Russia and Ukraine, the term wiperware or pseudo ransomware may pop up. Let’s break down what this means. 


Read More
id badge

Physical IDs will be obsolete by 2030

Madeline Lauver
March 1, 2022

Physical ID badges may soon be a security tool of the past. Enterprise security leaders are responding to user demand by adopting digital authentication practices.



Read More
Previous 1 2 … 224 225 226 227 228 229 230 231 232 … 562 563 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing