This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Publications » Security Magazine

Security Magazine

february emagazine

2022 February

This month, Security magazine explores challenges in hiring, rehiring and retaining security personnel with compounding issues of past furloughs, the COVID-19 pandemic, wages and employee evaluation of risk versus reward. How are enterprise security teams compensating to improve current workforce conditions? Throughout this month, check out profiles on Maureen Rush and On Call International, people risk management and operational resilience, the evolution of corporate security leadership roles, SMB physical security, cybersecurity vulnerabilities, perimeter security and more!
  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top
security workforce
Special Report

The state of the workforce: Hiring, rehiring and retaining qualified security

There are a number of factors compounding the challenging state of the workforce right now, but security leaders say it’s not all doom and gloom.
Maggie shein
Maggie Shein
February 1, 2022
Leaders are facing challenges in hiring, rehiring and retaining security personnel with compounding issues of past furloughs, the COVID-19 pandemic, wages and employee evaluation of risk versus reward. How are enterprise security teams compensating to improve current workforce conditions?
Read More

Featured Articles

Back to Top
product spotlight february
Product Spotlight

ISC West 2022 product preview

Check out the latest products and solutions to be introduced at ISC West 2022, from artificial intelligence-based access control to traffic monitoring and audio threat detection.
Madeline lauver headshot
Madeline Lauver
February 14, 2022

Check out the latest products and solutions to be introduced at ISC West 2022, from artificial intelligence-based access control to traffic monitoring and audio threat detection.


Read More
smb
Integrated Solutions

Physical security for SMBs

Small- and medium-sized business leaders share lessons learned and best practices to keep employees and assets safe.
Missy Kavanaugh-Carryer
February 11, 2022

Small- and medium-sized business leaders share lessons learned and best practices to keep employees and assets safe.


Read More
risk in security
Enterprise Services

People risk management and operational resiliency

Mitigating insider threat in any enterprise calls for the right tools and a nearly 360-degree view of risk.
Author1
Nada Marjanovich
Author2
Bruce McIndoe
February 9, 2022

Mitigating insider threat in any enterprise calls for the right tools and a nearly 360-degree view of risk. 


Read More
traveling in covid
Profile in Excellence

Fulfilling a mission: Securing travelers every day

On Call International Global Response Center Teams worked hand-in-hand to provide travel assistance to travelers in need.
Maria Henriquez
February 9, 2022

On Call International Global Security Services and Medical and Transportation Teams work hand-in-hand to provide travel assistance to travelers in need.


Read More
street
Profile in Excellence

45 years tearing down siloes: Maureen Rush

After several decades dedicated to safety and security, the Vice President for Public Safety and Superintendent of Police at the University of Pennsylvania’s Division of Public Safety semi-retires, but first she shares what she’s learned.
Madeline lauver headshot
Madeline Lauver
February 7, 2022

After several decades dedicated to safety and security, the Vice President for Public Safety and Superintendent of Police at the University of Pennsylvania’s Division of Public Safety semi-retires, but first she shares what she’s learned.


Read More
cso salary
Leadership

What’s the salary of a chief security officer?

The 20th annual Security and Compliance Compensation report gives industry professionals insight into what salaries their peers are earning.
February 7, 2022

The 20th annual Security and Compliance Compensation report gives industry professionals insight into what salaries their peers are earning.


Read More

Columns

Back to Top
education in security
Education & Training

Trends in perimeter security

William Plante
February 11, 2022

Learn about the Five D’s of perimeter security strategies and go beyond those with additional measures.


Read More
cyber
Cyber Tactics

Christmas came early — Log4Shell & mitigating open-source vulnerabilities

John mcclurg
John McClurg
February 4, 2022

The vulnerabilities of open-source software can have dire consequences and require all hands on deck.


Read More
men walking on beach
Leadership & Management

Leadership lessons across generations

Michael gips headshot
Michael Gips
February 4, 2022

Michael Gips shares stories of security leaders that have passed along their passion for the industry to their children.


Read More
train on tracks
Security Talk

Identifying solutions to enhance security

Maggie shein
Maggie Shein
February 4, 2022

Mark Edmonds, Manager of Security Capability at Sydney Trains, discusses the importance of trying and trialing new security technology to enhance operations and increase safety and security.


Read More
career intelligence
Career Intelligence

The evolution of top corporate security leadership roles

Brennan 2016 200px
Jerry J. Brennan
Pollock 2016 200px
Joanne R. Pollock
February 4, 2022

Differing philosophies about the concept of convergence of all security related risk areas into a single security executive’s portfolio is a hot topic.


Read More
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

  • clouds in sky
    Sponsored byMilestone Systems

    Smaller School Districts are Facing Infrastructure Growing Pains

  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

Popular Stories

Empty conference room

Cyber risk is a business risk

CT scanner

Cybersecurity threats to medical devices are a growing concern

laptop phone.jpg

31% of organizations had users fall for phishing attack

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

Ferrari-Interior.jpg

Ransomware attack exposed Ferrari customer data

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing