Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

critical-infrastructure-networks-freepik39586.jpg

CISA issues holiday warning: Critical infrastructure stay vigilant

November 22, 2021

The Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation are reminding critical infrastructure partners to stay vigilant against threats during holidays and weekends.


Read More
John Kreul headshot

John Kreul joins Jewelers Mutual Group as Chief Information Officer

November 22, 2021

John Kreul will oversee the operations and strategy of Jewelers Mutual Group's technology department as the insurance provider's Chief Information Officer.


Read More
double-exposure-image-business-profit-growth.jpg

Banks now required to report cyber incidents within 36 hours

November 22, 2021

Federal bank regulatory agencies approved a rule to improve the sharing of information about cyber incidents that may affect the U.S. banking system.


Read More
cyberworld-freepik

Why network-based zero trust doesn’t protect your most valuable assets

Eric Bednash
November 22, 2021

By shifting to data-centric zero trust with innovative solutions that integrate enhanced levels of control to data security, organizations can boost their ability to prevent breaches, defend against attacks, and combat increasingly sophisticated cybercriminal enterprises. 


Read More
password freepik

Passwordless made simple with user empowerment

Al-Khalidi headshot
Bassam Al-Khalidi
November 22, 2021

While relying on passwordless authentication is both easier and safer for IT and end users, the transitional period is everything but. 


Read More
education

Security awareness training: Top challenges and what to do about them

Steve Buege
November 22, 2021

Today’s security threat landscape necessitates that security leaders work on an ongoing, effective security awareness program, tackling the inherent challenge of employee participation.  


Read More
location-data-freepik55842.jpg

The unforeseen risks of sharing smartphone location data

Mike Fong updated
Mike Fong
November 19, 2021

From app usage to location data, developers are siphoning consumer data and selling it to data brokers and advertisers for top dollar. And while this data may be inconsequential, at its core, this issue is about consumers’ right to privacy. 


Read More
drones for security

Drones as security tools

Unmanned aircraft can provide enterprise security teams with a number of potential use cases, including improving incident response, investigations and more.
Adam Stone
November 19, 2021

With unmanned aircraft as a tool for their security teams, enterprise security can expand situational awareness, while making more effective use of a company’s human resources.


Read More
remote work/hybrid freepik

Mitigating the risk posed by remote work

Tom Miller
November 19, 2021

In a remote or hybrid environment, employers have less visibility into employee activity, and as a result, the risk has greatly increased.


Read More
Copy-of-Security-Podcast--Hanson-(1).png

Listen to Stephanie Jaros of the DoD's Counter-Insider Threat Program

November 19, 2021

Listen to the latest The Security Podcasts episode as we talk with Stephanie Jaros about insider risk, building an appropriate program, and the criticality of when to address such threats. 


Read More
Previous 1 2 … 266 267 268 269 270 271 272 273 274 … 561 562 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing