This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home

RSS Feeds

Instructions

Instructions for using RSS

Subscribe to Security Magazine's RSS Feed

Keep up to date on the latest news and information posted to Securitymagazine.com with our RSS feed.

Security Magazine Blog

The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Topic Feeds

Cyber Tactics

As security leaders gain increasing responsibility for cybersecurity, Security columnist John McClurg – Vice President and Ambassador-At-Large in Cylance’s Office of Security & Trust and former CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories – guides enterprise security executives through cybersecurity standards, frameworks, risks and management techniques.

Leadership & Management

In the security industry, transformation is inevitable. In this column, our columnist aims to spark a dialogue on leadership, management challenges and the evolution of the security profession. Join the conversation!

Security Talk Column

Editor Maggie Shein interviews key security executives on top-of-mind issues and challenges facing their organizations and the industry as a whole.

Career Intelligence

Looking to climb the corporate security ladder? Corporate security executive search leader Jerry J. Brennan offers insight and strategies to enable your ascent to the C-Suite.

Leader to Leader

Security industry veteran Burke Brownfeld has held a number of leadership roles throughout his career in both the public and private sector. Sit down with Brownfeld as he uses his experiences to formulate thought-provoking questions as he connects with security leader peers about their challenges, focuses and careers in the industry.

The Risk Matrix

Intelligence is becoming as essential for modern security in the private and non-profit sectors as it has long been for governments. In this column, Daniil Davydoff helps you navigate and leverage the latest ideas and developments in intelligence analysis, global and workplace risk, threat assessments and investigations.

The Corner Office

How can you earn your “Corner Office” in the enterprise? Learn about risk mitigation strategies, security vendor partnerships and new shifts in technology in Phil Aronson’s monthly column.

Zalud Report

Bill Zalud provides an insider view of the security profession and technologies but with an honest and balanced twist.

Trends Column

Publisher Mark McCourt provides a unique slant on the current and future of security management, including business metrics, new technology and leadership skills.

Ask the Integrator Column

Security Integrators are a necessary link between security product manufacturers and enterprise security leaders. In this regular column, we ask leading security integrators what trends they’re seeing on the horizon, and how security enterprise leaders can be prepared.

Overseas and Secure Column

As enterprises expand across the globe, so do the responsibilities of a security executive. Industry experts weigh in on wide-ranging issues from international investigations to supply chain resilience and more.

Industry Innovations

What are the latest products being introduced into the security market, and what specific benefits can they bring to your enterprise?

Cyber Products

The cyber risk landscape is changing at an alarming pace. Find out what products and services are available to help enterprise security leaders get ahead on cyber security.

New Technology Products

Security technology is one tool that enables enterprise security leaders to achieve their goals- learn more about new and upcoming security technology products and the latest industry innovations here.

Services Products

Security services such as background checks, investigations and insurance often provide the backbone of a success enterprise security program. Learn more about services that can assist security leaders in building a stronger, secure enterprise.

Featured Products

Discover new and innovative products for the security industry from our partners.

Security Enterprise Services

From security officers to mass notification to workplace violence mitigation, enterprise services work to add value to your organization.

Security Leadership and Management

Solutions for security executives to lead and manage their security staff, mitigate risk for their enterprise and show security's value in the C-suite.

Logical Security

Learn how to better manage authentication with Logical Security features and news.

Security & Business Resilience

How an enterprise can prepare for and recover after an emergency, disaster or pandemic.

Security Education & Training

What pitfalls can complicate background checks? How can you build a better whistleblower program? Learn a different skill monthly with Education & Training.

Profiles in Excellence

The security industry is changing, as is the profile of a successful security executive. Maintaining the status quo is no longer an option, and ignorance of risks is no longer an excuse for not mitigating them. This topic in Security features game-changing security directors or industry leaders in different sectors. So who is breaking new ground in the security industry, making great strides forward in risk management while better supporting the enterprise as a whole? If you know someone (or are someone) who fits this bill – let us know!

Submit Nomination for Profiles in Excellence

Access Management

Information related to the system that enables a security leader to control access to areas and resources in their enterprise.

Fire & Life Safety

Features related to security, fire and work safety issues, incidents and prevention.

Identity Management

Features and articles that focus on the way that security leaders identify individuals in their enterprises and control their access to particular areas.

Physical Security

Get the latest security industry news on guns, guards and gates.

Video Surveillance

How security cameras, DVRs and the future of cloud computing can help mitigate risk and provide for a secure enterprise.

Case Studies (Physical)

Learn more about real-world applications of surveillance cameras, perimeter security, security officer patrols and more.

Cyber Security News

Increasingly, a physical security director's role, the branch of computer security that is specifically related to the Internet, with issues involving fraud and the protection of transfer of data and a company's brand.

Case Studies (Cyber)

Learn more about real-world applications of cyber security, including how enterprise security leaders are using cyber products and services to advance their risk awareness and preparedness.

Top Cybersecurity Leaders

Each year, Security honors top cybersecurity executives who are positively impacting the security industry, their enterprise, their colleagues and their peers. In this annual report, learn how these cybersecurity leaders climbed the ranks to provide an overall positive impact that their security projects, programs or departments have on their shareholders, organizations, colleagues and the general public.

Nominate a Top Cybersecurity Leader

Arenas / Stadiums / Leagues / Entertainment

Big crowds; big challenges. From policies, procedures and technologies to the spotlight.

Banking/Finance/Insurance

Where compliance is essential, but also brand, data and identity concerns.

Construction, Real Estate, Property Management

The public, tenants, owners, visitors, architecture - a high-rise effort no matter the height.

Infrastructure:Electric,Gas & Water

From terrorism to vandalism, it's preparedness, response, training and partnerships.

Education: K-12

Safety means better teaching with crisis management, tech and threats like cyberbullying.

Education:University

There are communities with stakeholders, strategies, emotions, policies and solutions.

Government: Federal, State and Local

Managing regulation and addressing security risks in government capacities requires constant vigilance.

Hospitality & Casinos

With thousands of dollars changing hands every minute, casinos are a high-stakes environment for both visitors and security.

Hospitals & Medical Centers

Unique and shared problems to solutions in healthcare specific to products and services.

Ports: Sea, Land, & Air

Regulations & initiatives call for plans, physical enhancements & focused procedure.

Retail/Restaurants/Convenience

It's image in addition to shrink reduction, internal theft and organized retail crime.

Transportation/Logistics/Supply Chain/Distribution/ Warehousing

Cross company, cross borders - the key is details of transport, distribution and logistics.

Enterprise Services

Enterprise Services

Case Studies (Services)

Learn how security services, such as background checks, applicant screening, security uniforms and more, can add to your enterprise and your security program.

Coronavirus Blogs

A key role in corporate security leadership is in understanding global vulnerabilities. Here, we cover essential security information for security executives about Coronavirus.

Coronavirus and Business Continuity

Is your organization prepared to ensure operations and core business functions during Coronavirus? Here, we cover threats that Coronavirus poses to business continuity and solutions to minimize disruption.

Coronavirus and Cybersecurity

Scams, fraud, misinformation, ransomware and more: how are cybercriminals exploiting Coronavirus for their benefit?

Economic Impact of Coronavirus

The Coronavirus has had far-reaching consequences beyond the spread of disease and efforts to quarantine it. Here, we cover the impact of Coronavirus on the economy.

Coronavirus and Emergency Planning

Here, we offer emergency management and preparedness practices enterprises should employ during the Coronavirus crisis.

Coronavirus and Telecommuting Employees

The impact of the Coronavirus continues to change the way many organizations handle their day to day operations. One of the most jarring changes is a shift to remote work. What are some of the challenges, solutions and precautions enterprises should be aware of with remote or telecommuting employees?

Coronavirus News

Daily news stories about Coronavirus from around the world for the security executive.

Smart Building Security Featured Content

Read about how building security is getting smarter in the wake of COVID-19.

Smart Building Security Resources

Resources to help your organization plan for smarter building management.

Smart Building Security News

Read the latest news about smart building security.

The Security Benchmark Report

The Security Benchmark Report showcases the security profession's organizations and serves to examine the maturity of a company’s security program. The report focuses on metrics and data that security organizations can use to measure their security organizations against their peers, and includes data on budgets, tech spending, training, critical issues and more.

Most Influential People in Security

Articles about the most influential people in the security industry.

Security Newswire

Daily news stories from around the world for the security executive.

Top Guard and Security Officer Companies

Articles pertaining to top guard and security officer companies.

ISC West

Couldn’t make it to ISC West 2017? Don’t be left out of one of the biggest industry shows of the year – read up on our exclusive show coverage here.

White Papers

Insights and information submitted from companies around the industry.

Security 500 Conference

Security 500 Conference
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • hacking vital data
    Sponsored byConvergeOne

    Securing Vital Data through a New Age of Cyberattacks

Popular Stories

casino

Casino security on the Las Vegas Strip

police-alert-freepik1170x658v5.jpg

DHS issues national terrorism alert

docs-freepik1170x658v2.jpg

Microsoft Office zero day vulnerability discovered

cyber-password-freepik1170x658v4.jpg

Four ways cybercriminals can hack passwords

domain-name-freepik1170x658v.jpg

4 emerging threats in the domain name landscape

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
June 29, 2022

How to Build and Scale a Security Operations Center (SOC)

Security Operations Centers (SOCs) are a crucial component of safety and security culture. They support many strategic business objectives, from lowering costs and minimizing risk to improving employee trust and morale.

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Clear Seas Research

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing