Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

evacuation

Speeding up lockdowns and evacuations using mass notification

PatScheckel
Pat Scheckel
July 14, 2020

Evacuations and lockdowns are two events no organization wants to face, but every organization should be prepared for. They often happen in response to particularly dangerous situations that pose an immediate threat to people and property. It can be difficult to know how and when to make the decision to lockdown or evacuate, and it can be even more difficult to manage once the decision has been made. In either case, it requires organizations plan, test and have the right tools in place to reach all of their people quickly with information on what actions they should take to stay safe.


Read More
biometrics

COVID-19 and security: How we're moving to a touchless future

George Brostoff
July 14, 2020
Unfortunately, the pandemic has forced many people and businesses to reconsider biometric technology. With the COVID-19 virus spreading easily through touchpoints, fingerprint scanners can quickly become a source for infections, especially in public spaces. Offices and ATMs contain many points of contact, and maintaining cleanliness on surfaces is nearly impossible. Unfortunately, these high traffic areas are also frequently the ones that would benefit the most from increased security.
Read More
Access card reader, ominous

OSDP: The future of access control

John Nemerofsky
John Nemerofsky
July 14, 2020
It’s easy to see why the Open Supervised Device Protocol (OSDP), has become the security industry’s gold standard for access control installations. It enhances security, adds flexibility and makes systems easy to update and integrate with other devices. The Security Industry Association (SIA), with significant input from manufacturers and integrators, introduced OSDP in 2011 and it is now recommended for any public or private enterprise installation requiring a high level of security. Earlier this year, the International Electrotechnical Commission approved OSDP as an international standard.
Read More
retail-enews

Retail shrink totaled $61.7 billion in 2019

July 14, 2020
Theft, fraud and losses from other retail “shrink” totaled $61.7 billion in 2019, up from $50.6 billion the year before as industry security executives reported increases in the number of shoplifting, organized retail crime and employee theft incidents, according to the annual National Retail Security Survey released by the National Retail Federation.
Read More

Dr. Allen Harper joins T-Rex Solutions as Executive Vice President of Cybersecurity

July 14, 2020
T-Rex Solutions, LLC announced Marine Corps veteran, entrepreneur and cybersecurity executive Dr. Allen Harper joined the organization as Executive Vice President of Cybersecurity. Dr. Harper will lead the company’s delivery of secure cloud services to the Federal government.
Read More
FTC

FTC launches new online tool for exploring military consumer data

July 14, 2020
The Federal Trade Commission launched a new tool that explores data about problems military consumers may experience in the marketplace. For the first time, data about reports the FTC has received from active duty service members and veterans will be available online in an interactive dashboard at ftc.gov/explore data.
Read More
election

Biden campaign hires cybersecurity experts to defend against potential threats

July 13, 2020
The presidential campaign of former Vice President Joe Biden announced that it had filled the positions of chief information security officer (CISO) and chief technology officer (CTO) in order to address potential cybersecurity threats to the campaign. 
Read More
gsx+

General Stan McChrystal to deliver keynote address at GSX+ on Military & Law Enforcement Appreciation Day

July 13, 2020
ASIS International has announced that General Stan McChrystal, US Army (RET), will present a Global Security Exchange Plus (GSX+) keynote address on Military & Law Enforcement Appreciation Day at GSX+.
Read More
SEC0219-data-Feat-slide1_900px

How to protect ERP data when access to corporate networks is both ubiquitous and for sale on the dark web

Piyush Pandey
Piyush Pandey
July 13, 2020
With a myriad of employees and contractors given ubiquitous access to business data, one thing is clear; identity has become the new security perimeter. Ensuring ERP data security, privacy, and compliance can no longer rely solely on network threat monitoring but requires using a layered identity defense to limit access to and within mission-critical applications.
Read More
SEC0720-Prods-Feat-slide1_900px.jpg
Product Spotlight

Solutions for COVID-19 Response

July 13, 2020

SaaS plaforms, personal safety devices, store occupancy managers, access control and more. What are some new products that can help to secure an enterprise and its assets?


Read More
Previous 1 2 … 475 476 477 478 479 480 481 482 483 … 559 560 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing