Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

SEC0220-ISCprods-Feat-slide1_900px.jpg

ISC West Product Preview

Maria Henriquez
February 12, 2020

There are many new solutions on the horizon for video surveillance, access management, mobile credentials and much more at ISC West 2020.


Read More
internet of things

California’s 'Other' Game-Changer: Complying with the New IoT Cybersecurity Law

Reece Hirsch
February 11, 2020
When California Governor Jerry Brown signed Senate Bill 327 on September 28, California became the first state to enact legislation expressly governing cybersecurity measures that must be employed by manufacturers of Internet-connected “smart” devices, collectively known as the Internet of Things (IoT). The law, to be codified at California Civil Code Sections 1798.91.04–06, became effective on January 1, 2020.
Read More
Security Worker

Strategic Decision Support Centers Increase Public Safety and Responsiveness to Community Needs

Giovanni Gaccione
Giovanni Gaccione
February 11, 2020
As technologies and laws continue to evolve, and more people move into urban centers, cities are looking for ways to become smarter – and safer. Today, more than half of the world’s population lives in an urban area. It is predicted that by 2030, our planet will have 41 mega-cities with more than 10 million inhabitants each. After all, a successful city attracts businesses, fosters innovation and provides incredible opportunities for its citizens. But how do we construct and manage cities so that everything, and everyone, flows smoothly today and in the future? How can we ensure that cities are resilient and continue to succeed as they grow?
Read More
boonedam-entrance2

Four Reasons Why Your Active Shooter Plan Should Include Security Entrances

JC Powell
JC Powell
February 11, 2020

The Mass Shooting Tracker reported that in 2019 there were 374 mass shootings in the U.S. Given this reality, it is essential to take all possible steps to protect your employees and visitors from harm. It should be a core requirement of every organization’s security plan to give serious consideration to how they will thwart an active shooter. Putting a security plan in place to guard against on-site violence begins at the perimeter, and security entrances are a strong first line of defense against the threat of an active shooter. 


Read More
SEC0220-ROI-Feat-slide1_900px.jpg

Calculating ROI for Better Security

Here, we dive into more conventional ROI justifications for security purchases.
Darrell Clifton CPP
February 10, 2020

Security often gets left behind with each new budget. What are some strategies to help you cross off some security solutions off your wishlist and keep people and assets safe and secure?


Read More
SEC0220-bleed-Feat-slide1_900px

Can Civilians Stop the Bleed?

The work to empower civilians to act as immediate first responders continues.
Maria Henriquez
February 7, 2020

Can civilians be trained to Stop the Bleed and effectively assist victims prior to the arrival of first responders?


Read More
cybersecurity

The Top 20 Cybersecurity Conferences to Attend in 2020

Maria Henriquez
February 6, 2020

Taking place across the U.S. and the world, cybersecurity conferences can offer unique opportunities for cybersecurity professionals, such as hands-on workshops, networking and certifications. They also provide cybersecurity leaders with greater security awareness of threats, tactics and best practices needed to effectively thwart attacks on the systems and assets they protect. Here, Security brings you a list of the top 20 cybersecurity conferences in the U.S. in 2020.


Read More
SEC1119-awareness-Feat-slide1_900px

Cybercrime Breaches Cost Corporate Boards Big Time: Have You Done Your Due Diligence?

john sileo
John Sileo
February 6, 2020

Back away from the snooze button. This is a $29 million wake-up call you can’t afford to miss. In January 2019, Yahoo’s board agreed to pay the enormous $29 million settlement to its shareholders as the result of cyberattacks that compromised three billion Yahoo user accounts. It was the first time shareholders had successfully held a company responsible for data breaches. And it is a loud warning to corporate boards that they must start paying attention to cyber risks. But are they? 


Read More
Encryption Future - Security Magazine

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

darren anstee
Darren Anstee
February 6, 2020
There seems to be a consensus for advocates of private Internet use that encryption is a good thing, and that encryption of DNS is needed to prevent network operators from gaining visibility into the sites and services their users lookup (and then visit). Two protocols have been created to achieve this encryption: DNS over TLS (DoT) and DNS over HTTPS (DoH). While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:
Read More
SEC0220-profile-Feat-slide1_900px

Tim McCreight: Calgary's Trusted Advisor

Find out how Tim McCreight, acting CSO for the city of Calgary, Alberta in Canada, works to ensure organizational resilience.
Maria Henriquez
February 5, 2020

As the Acting CSO for the city of Calgary, Alberta, what security controls and models does Tim McCreight rely on to protect assets, employees and information?


Read More
Previous 1 2 … 511 512 513 514 515 516 517 518 519 … 561 562 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

Coding

Epstein File Data Security Update: Raw Code Found in Emails

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing