Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Authors » Security Staff

Security Staff

Articles

ARTICLES

April-issue-preview.jpg

Inside Security's April 2022 issue: Preparing global security operations centers for remote connectivity

Plus: De-escalation, access control, the metaverse, loss prevention, security jobs and much more.
Security Staff
April 25, 2022

Security magazine's April 2022 issue explores virtual global security operations centers (GSOC), de-escalation strategies, loss prevention, access control & more!


Read More
school students

School safety crisis guidelines shape emergency response

Security Staff
April 22, 2022

The Colorado School Safety Resource Center (CSSRC) released crisis guidelines to help K-12 security leaders and security teams at institutions of higher education prepare for and respond to large-scale emergencies.


Read More
email phishing

Retail sector named top target of phishing attacks

Security Staff
April 22, 2022

Retail organizations saw a 400% increase in phishing attacks, according to the 2022 ThreatLabz Phishing Report from Zscaler.



Read More
cyber-security-freepik1170x658v486.jpg

Third-party identity risk increases vulnerability to cyberattacks

Security Staff
April 22, 2022

Organizations are not taking the necessary steps to manage lifecycle of their third-party identities, making them more vulnerable to cyber incidents, a SecZetta survey found. 


Read More
passenger-airport-freepik1170.jpg

Zero tolerance policy against unruly passengers is permanent

Security Staff
April 22, 2022

The Federal Aviation Administration (FAA) will make its Zero Tolerance policy against unruly passengers permanent.  


Read More
David_Cass_Headshot_2022.jpg

David Cass named President of CISOs Connect

Security Staff
April 21, 2022

GSR Chief Information Security Officer David Cass has been appointed President of CISOs Connect, an exclusive community of cybersecurity leaders. 


Read More
coast line

Florida environmental orgs use LiDAR for disaster preparedness

Security Staff
April 21, 2022

As climate change causes sea levels to rise, Florida communities can benefit from LiDAR mapping to predict storm surges and flood risk, aiding severe weather and disaster preparedness.


Read More
email security

Cybersecurity threats facing enterprise email accounts

Security Staff
April 21, 2022

An email security report from Cyren found common threats facing business email accounts at U.S. and U.K. organizations.


Read More
chuck miller headshot

Charles Miller named CISO at Blackbaud

Security Staff
April 21, 2022

Charles "Chuck" Miller, former SVP of Cybersecurity at Truist and SunTrust, has been named the new Chief Information Security Officer (CISO) at Blackbaud, a cloud software company.


Read More
cyber-sec-freepik1170x658v35.jpg

CISA's Joint Cyber Defense Collaborative to include industrial control systems leaders

Security Staff
April 20, 2022

Several Industrial Control Systems (ICS) leaders will now be part of CISA's Joint Cyber Defense Collaborative to help increase cybersecurity and resilience of industrial control systems and operational technology (ICS/OT). 


Read More
View All Articles by Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing