Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

SEC-0421-Cover-VERT_450px

2021 April

This April 2021, Security magazine highlights lone worker protection - find out how the COVID-19 pandemic has created more lone workers than ever - and now, organizations must adhere to new duty of care and security plans, or risk leaving critical employees unprotected and at risk. Throughout this month, check out a Profile in Excellence on DoorDash CISO Justin Grudzien, how to prepare for extremism in the workplace, how to hire your security teams, the risk of deepfakes, a case study on Marriott International's largest property and its security technology, and more!

  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top
SEC0421-Cover-Feat-Slide1-900px

Lone worker protection: A commitment to duty of care and security

Organizations in charge of protecting lone workers must fulfill their duty of care, taking all steps reasonably possible to ensure their safety.
Maria Henriquez
April 1, 2021

The impact of the COVID-19 pandemic has been widespread and unprecedented, creating more lone workers than ever. Organizations in charge of protecting lone workers must fulfill their duty of care, taking all steps reasonably possible to ensure the safety, well-being and physical and mental health of their employees, or else, risk leaving critical employees unprotected and at risk.


Read More

Featured Articles

Back to Top
SEC0421-ProdSpot-Feat-slide1_900px

Product spotlight on cybersecurity, data protection, and privacy solutions

Maria Henriquez
April 16, 2021

Check out the latest cybersecurity products, all designed to protect your networks, infrastructure, critical data, assets and private information.


Read More
SEC0421-SecurityCareer-FEAT_MAIN_1170x878px

Hiring for personality

When it comes to completing your security team, hiring the right employees will lead you, your team and your organization to greater success, but finding, recruiting and retaining top security talent may be easier said than done.
Maggie Shein
Maggie Shein
April 9, 2021

Security teams should be carefully selected to meet an organization’s needs in terms of competence, but perhaps, more importantly to foster inclusion, diversity and a strong sense of team. When it comes to completing your security team, hiring the right employees will lead you, your team, and your organization to greater success, but finding, recruiting and retaining top security talent may be easier said than done.


Read More
SEC0421-DeepFake-FEAT_MAIN_1170x878px
Risk Management

Don’t discount the risk of deepfakes to the enterprise

Many security researchers are now predicting that deepfakes could become a major security threat in the 2021-2022 period. Where is the threat and what can you do about it?
Darren Thomson
Darren Thomson
April 14, 2021

In recent years, there has been a recognition that social engineering plays a huge part in the execution of cybersecurity attacks. The intersection of “non-physical” and “technical” social engineering is where criminals are mostly focused today. Enter deepfake technology, which poses a looming risk over enterprises and their security leaders as they figure out how to prepare for and mitigate such a risk.


Read More
SEC0421-Opryland-FEAT_MAIN_1170x878px
Case Study: Integrated Solutions

The Gaylord Opryland Resort boosts security

April 12, 2021

Marriott International’s largest Marriot property in the world, the Gaylord Opryland Resort and Convention Center in Nashville needed a security upgrade at its sprawling campus to enhance security and efficiency, and its risk management operations. Learn about the resort’s video surveillance and video management system installation.


Read More
SEC0421-Profile-FEAT_MAIN_1170x878px
Profiles in Excellence

Long-term commitment to security

Maggie Shein
Maggie Shein
April 5, 2021

Take a look at CISO of DoorDash Justin Grudzien’s career in data privacy and security from building security teams from the ground up at Orbitz to solidifying best practices at DoorDash. Security talks to Grudzien about how he views security roles within the enterprise, how to avoid burnout, and how other security leaders can earn a seat at the C-Suite table.


Read More

Columns

Back to Top
SEC0421-Leadership-Feat-Slide1-900px
Leadership & Management

A CSO and a sea horse walk into a bar…

Michael Gips
Michael Gips
April 1, 2021

Last month this column looked at how humor can enhance leadership. Inspired by the book "Plato and a Platypus Walk Into a Bar: Understanding Philosophy Through Jokes," this month’s column explains security leadership through jokes.


Read More
SEC0421-Edu-FEAT_MAIN_1170x878px
Education & Training

Gaining a video surveillance ‘edge’ in the cloud

SEC0421-Edu-Slide2-900px
Nigel Waterton
April 16, 2021

Video storage is an important consideration in any surveillance project while simultaneously being one of the most overlooked. Let’s face it: storage does not exactly provide the “wow factor” of analytics or 4K image quality, but it is the backbone on which entire video security systems are built. If you cannot retrieve and review footage in a timely manner, all the other shiny features you have incorporated into your security surveillance solution is for naught.


Read More
wolf-in-sheeps-clothing-2577813_1920

When it comes to insider risk, not all employees are equal

Maggie Shein
Maggie Shein
April 6, 2021

As a young boy, Frank Figliuzzi had a sense of right and wrong, good and bad. He was so interested in criminal justice that at the age of 11, he wrote a letter to the head of the Federal Bureau of Investigation (FBI) asking for advice on a career in the field.


Read More
SEC0421-Cyber-Feat-Slide1-900px
Cyber Tactics

Mission-critical supply chain software: A growing operational priority

John McClurg
John McClurg
April 1, 2021

Today, open-source code is everywhere. In fact, 99% of all codebases contain open-source code, and anywhere from 85% to 97% of enterprise codebases come from open-source. What does that mean, exactly? It means that the vast majority of our applications consist of code we did not write.


Read More
SEC0421-Career-Feat-Slide1-900px
Career Intelligence

Positive brand reputation will advance your security career

Have you considered what you can do to help build a positive brand reputation for yourself and your organization?
Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
April 1, 2021

We have previously talked about many aspects of how to advance your security career. This includes having a thorough understanding of both soft and operational skills sought after by organizations. The ability to execute on these attributes is valued when companies look for top talent for senior level security roles.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing