Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

retail-feature

Supporting Loss Prevention in Retail

Rob Borsch
April 14, 2020
In retail, brick-and-mortar stores experience loss or shrink due to shoplifting, fraud, employee theft and human error. To mitigate against this, many have dedicated loss prevention (LP) personnel who use a variety of tools, including in-store video surveillance systems and point of sale (POS) systems, to deter and investigate theft. But, despite the continued best efforts of LP teams, shrink is on the rise.
Read More
entrance

Decoding Security Entrances: Getting Familiar with Local Codes

Understanding safety issues helps end-users choose security solutions wisely
al vandine
Al Vandine
April 14, 2020
Both turnstiles and doors are being integrated with advanced electronic access control, video surveillance and other intrusion sensors to provide enhanced security and cost-effective operational management options that help save on manned guard resources and offer real-time analytics. However, revolving doors and turnstiles are subject to special code requirements that are different than codes for swinging or sliding doors to ensure the safety of building occupants if emergency evacuation is necessary.
Read More
covid-19 survey

Survey Shows How the Security Industry is Mitigating Risk during COVID-19

Maria Henriquez
April 14, 2020

How is the enterprise security industry working to keep facilities and employees safe? What new challenges do you face each day, particularly as employees work from home offices?  In new research, Security Magazine and Clear Seas Research, a BNP Media company, examines the impact of the pandemic on the industry. 


Read More
Security conferences

Security Conferences in 2020: What’s Canceled, Postponed, Going Virtual or Proceeding as Planned?

Maria Henriquez
April 9, 2020

Which security conferences have been canceled, postponed or going virtual in 2020 due to the coronavirus? Here is a list of security conferences for cybersecurity and physical security professionals, that are still proceeding as planned, going virtual or that have been postponed or canceled. 


Read More
SEC0420-ces-Feat-slide1_900px

CES Unveils Array of Security Technologies

If CES is any indication, artificial intelligence, drones, robots and more will soon be everywhere.
Michael Gips
Michael Gips
April 8, 2020

Learn how artificial intelligence, drones, detection systems and more shown at this year’s Consumer Electronics Show are now working their way into many security applications.


Read More
Sounil Yu

Sounil Yu Joins YL Ventures as Chief Information Security Officer-in-Residence

April 6, 2020
Sounil Yu, former Chief Security Scientist at Bank of America, will join the YL Ventures team as its full-time CISO (Chief Information Security Officer)-in-Residence.
Read More
SEC0420-profile-Feat-slide1_900px

Kristin Lenardson: A Career in Protective Services

How Kristin Lenardson manages risk services, travel security programs and more.
Maria Henriquez
April 6, 2020

How has Kristin Lenardson, Vice President of Managed Risk Services at WorldAware, successfully transitioned from the government to the private sector, managed and built travel security programs and advanced in the security world?


Read More
covid19

Free Security Resources and Services for COVID-19

Maria Henriquez
April 3, 2020

Here is a list of free resources, guides, frameworks, services and products to help enterprise security to navigate the coronavirus pandemic. If your organization is offering resources and products at no cost, please email henriquezm@bnpmedia.com to be included.


Read More
SEC0420-talk-Feat-slide1_900px
Security Talk

First Responders and Mental Health

diane-2016-200.jpg
Diane Ritchey
April 3, 2020

After being exposed to countless traumatic events, first responders often struggle with PTSD and mental health disorders. Beyond extending workers compensation benefits, what more can we do to help first responders?


Read More
The Long and Winding Road to Cyber Recovery

Security from the Start: Why Cyber Awareness is Critical at the Initial Stages of Business

reut hackmon
Reut Hackmon
April 2, 2020
In spite of this cyber war and in an effort to be first to market, many companies still rush their products out while ignoring proper security integration during development which can lead to disastrous side effects for businesses. Costing them valuable data, reputation, money and time to amend their product weaknesses. Companies can spend a great deal of time and money developing security patches, repeatedly rolling back and implementing updates, and buying other technologies to secure their own offering. This cycle can potentially continue for years releasing cures to the latest aliments while fearing the next hit. 
Read More
Previous 1 2 … 501 502 503 504 505 506 507 508 509 … 558 559 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing