This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Email
Tweet

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Security blog default

Working with Government to Help Secure Our Elections

Dave Gerry
Dave Gerry
April 9, 2020

You don’t have to be a news junkie to notice one of the bigger stories the media is focusing on these days. Whether it’s local, state or national races, election security has become a serious issue.


Read More
Security blog default

The Rise of the Chief Cybercrime Officer

Matt Cable
Matt Cable
April 8, 2020

The TalkTalk data breach in 2015 was monumental for the cybersecurity industry. At the time, data breaches were hardly new, but this particular breach resulted in the government recommending that an officer should be appointed with day-to-day responsibility for protecting computer systems from a cyber attack. 

 


Read More
coronavirus

What Law Enforcement and Security Personnel Need to Know about Coronavirus (COVID-19)

Gregory Richter
Gregory Richter
March 20, 2020
During this COVID-19 crisis, law enforcement and security personnel are not only expected to continue their usual levels of service to the public, but are also expected to assist in community and government efforts combatting the virus. It is important that law enforcement and security officers are aware of the following information: Recognition, Protection, Personal Protection Equipment (PPE) and how to Respond if Exposed.
Read More
coronavirus

Incident Management Protocols during COVID-19

Juan Kirsten
March 18, 2020
Limiting the spread and collateral damage that COVID-19 poses to the world will heavily depend on the level of situational awareness of the people on the ground and their reaction speed. What are some incident management protocols security leaders should keep in mind during COVID-19?
Read More
Security blog default

Coronavirus: Keeping Business Moving While Supporting Staff on the Road

Donna Miller
Donna Miller
March 12, 2020

The COVID-19 virus may have started in China, but its effects are spreading across the globe – in various forms beyond the virus itself. In addition to the tragic loss of life it has already claimed, the virus’ impact on the business world has been far-reaching.


Read More
Here, a CDC healthcare worker takes the proper measurements to ensure that she is protected in an Ebola clinic in West Africa - Security Magazine

A Guide to Situational Awareness and Hospitality Protocols to Combat the Coronavirus

Jean-Pierre Roux
March 11, 2020
Human resources departments (HR) handing out information sheets is not going to curb the spread of the Coronavirus (COVID-19). Training has to be conducted in concert and in person to all by the security department, as, it is a security threat. Here are some protocols and policy management procedures your enterprise and security department should consider to mitigate the spread of Coronavirus. 
Read More
Changing the Hoodie Image for Cybersecurity

Engaging Young Women and Girls in STEM to Bridge the Cybersecurity Job Gap

karen panetta
Karen Panetta
March 8, 2020
To more effectively bridge the cybersecurity job gap, we should look towards a particularly underrepresented group in STEM – young women and girls.
Read More
Security blog default

What Security Leaders Can Learn From the Coronavirus Threat

A. Benjamin Mannes
A. Benjamin Mannes
March 3, 2020

A key role in corporate security leadership is in understanding global vulnerabilities as part of a shift that goes beyond traditional security concerns, in order to anticipate new risks to your organization.


Read More
epidemic

Security Prepare to Combat Coronavirus

No one knows if Coronavirus could turn into a pandemic but, at this moment in time, this must be seriously considered.
Juan Kirsten
March 2, 2020
A few months ago, ISIO suggested in articles that security managers must ensure that there is a contingency in the budget to obtain equipment or skills training in case of an unknown threat that could arrive out of the blue. Any responsible managing or finance director must consider allocating funding and preparing for this emerging threat because it has life impacting or life and death possibilities.
Read More
Security blog default

Are Your Security Systems Interoperable?

A. Benjamin Mannes
A. Benjamin Mannes
February 28, 2020

Twenty-three years ago, when I worked with the Federal Protective Service policing federal facilities where security contract oversight was key, the General Services Administration and U.S. Justice Department designed systems that complimented each other to provide concentric layers of protection against unlawful entry and other threats.


Read More
Previous 1 2 … 10 11 12 13 14 15 16 17 18 … 162 163 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

Popular Stories

The 2023 Security Benchmark Report

The 2023 Security Benchmark Report

SEC Top Cybersecurity Trends of 2023 header

Top cybersecurity trends of 2023

Electronic scale of justice

SolarWinds CISO faces fraud charges for misleading investors

mall decorated for christmas

Data breach and identity protection concerns are at an all-time high

computer with green vertical text

Organizations face an average of 86 ransomware attacks annually

SEC AuditBoard webinar

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
LinkedIn

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing