Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

cyberattack

Data Breach Notification in Washington Amended

May 3, 2019

Washington State Legislature passed a set of amendments to Washington’s data breach notification statutes for businesses and government agencies.


Read More
SEC0519-profile-Feat-slide1_900px

Security by the Book

Barnes & Noble's Loss Prevention chief reflects on retail security trends.
Adam Stone
May 3, 2019

Barnes & Noble's Loss Prevention chief reflects on retail security trends.


Read More

TSA Will Discuss Security Protocols After Security Breach Last Month

May 2, 2019

TSA, airport officials and security personnel will talk potential changes after the security breach last month where a man assaulted a traveler. 


Read More

New China ID Card Will Track DNA and More

May 1, 2019

According to Sohu.com, China's new ID Card will track DNA information, location and more. 


Read More
mobile

Mobile Credentials: Why Should You Adopt Them and What You Need to Know

Maria Henriquez
May 1, 2019

According to a report from App Annie, people use nine applications daily, and in a month, they use 30. Why is this relevant? Brivo’s study, “3 Key Drivers to Technology Adoption in Physical Security”, reveals 81 percent of survey respondents are reliant on mobile applications to manage their facilities and people and 62 percent of them are using one to five mobile applications for work.


Read More
SEC0519-cover-Feat-slide1_900px

How SOCS Help in Training Security Professionals

How are McAfee's new SOCs mitigating cyber and physical risks and training future security leaders?
diane-2016-200.jpg
Diane Ritchey
May 1, 2019

McAfee's new SOCs are designed to protect employees and customers, identify cybersecurity product needs and ensure collaboration.


Read More
SEC0519-talk-Feat-slide1_900px
Security Talk

How to Keep Your Top Performers from Leaving

diane-2016-200.jpg
Diane Ritchey
May 1, 2019

First, the good news: the U.S. economy added a solid 196,000 jobs in March and unemployment is at 3.8 percent. The bad news: it is harder than ever to find and retain talented professionals.


Read More
SEC0519-Cyber-Feat-slide1_900px

Machine Learning: How It Works

John McClurg
John McClurg
May 1, 2019
Machine Learning leverages a four-phase process: Collection, Extraction, Learning and Classification.
Read More
SEC0519-career-Feat-slide1_900px

Are You Hiring the Best?

Brennan-2016-200px.jpg
Jerry J. Brennan
May 1, 2019

Imagine that you have just been selected for your dream job as the new Chief Security Officer at a major multinational corporation. It’s a new role and their board is looking to you to hire the best and the brightest for your new team.


Read More
MobileSecurity2

Small Businesses Lack Proper Security Standards

April 26, 2019

More than three-fourths of small businesses (84 percent) include social media integration or messaging features on their app to keep users on their app for a longer period of time, according to a survey from Clutch. 


Read More
Previous 1 2 … 524 525 526 527 528 529 530 531 532 … 558 559 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing