Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

desk covered in office supplies

Ahmed Fessi joins Medius as Chief Transformation & Information Officer

Security Staff
October 9, 2023

Ahmed Fessi was hired as Chief Transformation & Information Officer at Medius. Fessi brings 15 years' of experience with AI, data and cybersecurity.


Read More
building a strong security program
Security Program Design: Part 2

Strategies for developing an effective security program: Build the right solution

In part two of the Security Program Design series, security leader J. Nicole McDargh breaks down the seven steps to building a strong security program.
J. Nicole McDargh
J. Nicole McDargh
October 9, 2023

In part two of the Security Program Design series, security leader J. Nicole McDargh breaks down the steps to developing an effective security program.


Read More
desk with two monitors and speaker

Jeremy Rahn hired as Director of Data Governance, IT and Security Operations Team at DataDelivers

Security Staff
October 6, 2023

Jeremy Rahn was hired as Director of Data Governance, IT and Security Operations Team at DataDelivers. Rahn has 15 years of cybersecurity experience.


Read More
phone open to chatgpt on green background

5 pros and cons of using generative AI during incident response

Victor Sergeev
October 6, 2023

While AI tools can handle basic tasks, they are not ready to completely take them over yet, particularly in complex fields like cybersecurity.


Read More
half open laptop with blue and pink screen

Navigating 5 top threats to web security

Cliff Stanton
October 6, 2023

Unlike a company’s system and infrastructure, an organization’s website is a public-facing asset that is constantly at risk of a cyberattack. 


Read More
Detecting and Managing Fraud
Enterprise Services

Best practices for detecting and managing fraud

A look at changes in the fraud management landscape, the building blocks of a strong fraud investigation process, and what to avoid.
Sarah Ludwig Rausch
October 5, 2023

Using lessons from across physical security and cybersecurity fraud prevention can help security professionals build robust anti-fraud programs.


Read More
perimeter security
Integrated Solutions

The 6 challenges of securing large perimeters

Overcoming perimeter security challenges demands a holistic approach that integrates technology, personnel and processes to ensure a robust and effective security strategy.
Landry Headshot
Mark Landry
October 5, 2023

Overcoming perimeter security challenges demands a holistic approach that integrates technology, personnel and processes to ensure a robust and effective security strategy.


Read More
man in suit walking across crosswalk

Collaboration between the CISO and other business leaders is critical

Troy Fine
October 4, 2023

Fostering collaboration between the CISO and the C-suite can help organizations meet today’s most pressing security and compliance challenges.


Read More
cyber security

Going back to the basics this Cybersecurity Awareness Month

Max Shier
October 2, 2023

Since the first Cybersecurity Awareness Month, the industry has made significant strides in raising overall awareness around cybersecurity threats.


Read More
Security professionals
Special Report

Building a cohesive security program starts at the top

Security leaders share their tips on building and maintaining a strong, cohesive and effective security program.
Rachelle Blair-Frasier, Editor in Chief
Rachelle Blair-Frasier
October 2, 2023

Security leaders discuss strategies to create effective security programs that communicate across the security organization and the enterprise at large.


Read More
Previous 1 2 … 31 32 33 34 35 36 37 38 39 … 559 560 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing