This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home

RSS Feeds

Instructions

Instructions for using RSS

Subscribe to Security Magazine's RSS Feed

Keep up to date on the latest news and information posted to Securitymagazine.com with our RSS feed.

Security Magazine Blog

The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Topic Feeds

Cybersecurity Education & Training

Focusing on cybersecurity, this column covers essential topics for CISOs, including cyber leadership, infosec best practices, pentesting, red teaming, zero trust, threat assessments, data security and privacy, insider threats and more.

Cyber Tactics Column

Columnist and cybersecurity leader John McClurg guides CISOs through cybersecurity standards, information security tools, security frameworks and risk management techniques.

Leadership & Management

In the security industry, transformation is inevitable. In this column, our columnist aims to spark a dialogue on leadership, management challenges and the evolution of the security profession. Join the conversation!

Security Talk Column

Editor Maggie Shein interviews key security executives on top-of-mind issues and challenges facing their organizations and the industry as a whole.

Career Intelligence

Looking to climb the corporate security ladder? Corporate security executive search leader Jerry J. Brennan offers insight and strategies to enable your ascent to the C-Suite.

Leader to Leader

Security industry veteran Burke Brownfeld has held a number of leadership roles throughout his career in both the public and private sector. Sit down with Brownfeld as he uses his experiences to formulate thought-provoking questions as he connects with security leader peers about their challenges, focuses and careers in the industry.

The Risk Matrix

Intelligence is becoming as essential for modern security in the private and non-profit sectors as it has long been for governments. In this column, Daniil Davydoff helps you navigate and leverage the latest ideas and developments in intelligence analysis, global and workplace risk, threat assessments and investigations.

Cyber Products

Check out cybersecurity defense products and services that offer threat intelligence, data security, identity and access management, endpoint detection and response, cloud and mobile security and more.

New Security Technology

For unified physical security, learn about security technology and the latest security products, including video surveillance cameras, perimeter fencing, access control, risk assessments, CCTV, fire alarms and more.

Security Services

Guarding and security officers, executive protection, loss prevention, event security and more — learn about these and other security services that can help build a successful enterprise security program.

Featured Products

Discover new and innovative products for the security industry from our partners.

Security Enterprise Services

From security officers to mass notification to workplace violence mitigation, enterprise services work to add value to your organization.

Security Leadership and Management

Solutions for security executives to lead and manage their security staff, mitigate risk for their enterprise and show security's value in the C-suite.

Logical Security

Learn how to better manage authentication with Logical Security features and news.

Security & Business Resilience

How an enterprise can prepare for and recover after an emergency, disaster or pandemic.

Security Education & Training

What pitfalls can complicate background checks? How can you build a better whistleblower program? Learn a different skill monthly with Education & Training.

Profiles in Excellence

The security industry is changing, as is the profile of a successful security executive. Maintaining the status quo is no longer an option, and ignorance of risks is no longer an excuse for not mitigating them. This topic in Security features game-changing security directors or industry leaders in different sectors. So who is breaking new ground in the security industry, making great strides forward in risk management while better supporting the enterprise as a whole? If you know someone (or are someone) who fits this bill – let us know!

Submit Nomination for Profiles in Excellence

Access Management

Information related to the system that enables a security leader to control access to areas and resources in their enterprise.

Fire & Life Safety

Features related to security, fire and work safety issues, incidents and prevention.

Identity Management

Features and articles that focus on the way that security leaders identify individuals in their enterprises and control their access to particular areas.

Physical Security

Get the latest security industry news on guns, guards and gates.

Video Surveillance

How security cameras, DVRs and the future of cloud computing can help mitigate risk and provide for a secure enterprise.

Case Studies (Physical)

Learn more about real-world applications of surveillance cameras, perimeter security, security officer patrols and more.

Cybersecurity News

Latest news on cybersecurity, including data breaches, security vulnerabilities, cyberattacks, malware and phishing attacks, data privacy and compliance, cybersecurity conferences and more.

Top Cybersecurity Leaders

In this annual report, discover how top cyber professionals establish enterprise-wide information security strategies, bridge the cybersecurity skills gap, champion diversity and increase digital defenses of the infosec industry as a whole.

Nominate a Top Cybersecurity Leader

Cyber Case Studies

Learn about real-world applications of cybersecurity, including how enterprise IT security leaders use cyber solutions and services to advance their risk awareness and digital preparedness.

Arenas / Stadiums / Leagues / Entertainment

Big crowds; big challenges. From policies, procedures and technologies to the spotlight.

Banking/Finance/Insurance

Where compliance is essential, but also brand, data and identity concerns.

Construction, Real Estate, Property Management

The public, tenants, owners, visitors, architecture - a high-rise effort no matter the height.

Infrastructure:Electric,Gas & Water

From terrorism to vandalism, it's preparedness, response, training and partnerships.

Education: K-12

Safety means better teaching with crisis management, tech and threats like cyberbullying.

Education:University

There are communities with stakeholders, strategies, emotions, policies and solutions.

Government: Federal, State and Local

Managing regulation and addressing security risks in government capacities requires constant vigilance.

Hospitality & Casinos

With thousands of dollars changing hands every minute, casinos are a high-stakes environment for both visitors and security.

Hospitals & Medical Centers

Unique and shared problems to solutions in healthcare specific to products and services.

Ports: Sea, Land, & Air

Regulations & initiatives call for plans, physical enhancements & focused procedure.

Retail/Restaurants/Convenience

It's image in addition to shrink reduction, internal theft and organized retail crime.

Transportation/Logistics/Supply Chain/Distribution/ Warehousing

Cross company, cross borders - the key is details of transport, distribution and logistics.

Enterprise Services

Enterprise Services

Case Studies (Services)

Learn how security services, such as background checks, applicant screening, security uniforms and more, can add to your enterprise and your security program.

Coronavirus Blogs

A key role in corporate security leadership is in understanding global vulnerabilities. Here, we cover essential security information for security executives about Coronavirus.

Coronavirus and Business Continuity

Is your organization prepared to ensure operations and core business functions during Coronavirus? Here, we cover threats that Coronavirus poses to business continuity and solutions to minimize disruption.

Coronavirus and Cybersecurity

Scams, fraud, misinformation, ransomware and more: how are cybercriminals exploiting Coronavirus for their benefit?

Economic Impact of Coronavirus

The Coronavirus has had far-reaching consequences beyond the spread of disease and efforts to quarantine it. Here, we cover the impact of Coronavirus on the economy.

Coronavirus and Emergency Planning

Here, we offer emergency management and preparedness practices enterprises should employ during the Coronavirus crisis.

Coronavirus and Telecommuting Employees

The impact of the Coronavirus continues to change the way many organizations handle their day to day operations. One of the most jarring changes is a shift to remote work. What are some of the challenges, solutions and precautions enterprises should be aware of with remote or telecommuting employees?

Coronavirus News

Daily news stories about Coronavirus from around the world for the security executive.

Smart Building Security Featured Content

Read about how building security is getting smarter in the wake of COVID-19.

Smart Building Security Resources

Resources to help your organization plan for smarter building management.

Smart Building Security News

Read the latest news about smart building security.

Video Security and Government Compliance Blog

Stay up-to-date with Pelco's cybersecure, future-proof video security solutions and how they help you meet government regulations.

Government Compliance FAQs

Learn more about the rules and government regulations that can affect your video security solutions.

Compliant Video Security Products

Explore video security solutions that allow you to comply with government regulations.

The Security Benchmark Report

The Security Benchmark Report showcases the security profession's organizations and serves to examine the maturity of a company’s security program. The report focuses on metrics and data that security organizations can use to measure their security organizations against their peers, and includes data on budgets, tech spending, training, critical issues and more.

Most Influential People in Security

Articles about the most influential people in the security industry.

Security Newswire

Daily news stories from around the world for the security executive.

Top Guard and Security Officer Companies

Articles pertaining to top guard and security officer companies.

ISC West

Couldn’t make it to ISC West 2017? Don’t be left out of one of the biggest industry shows of the year – read up on our exclusive show coverage here.

White Papers

Insights and information submitted from companies around the industry.

Security 500 Conference

Security 500 Conference
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security camera
    Sponsored byAxis

    The power of analytics in surveillance: What can they do for you?

  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

Top security conferences of 2023

Top security conferences of 2023

Cyber tactics

2023: The year for contextual cyber threat intelligence

Campus security officer

Considerations for security officer training in healthcare facilities

ransomware

Ransomware attacks decreased 61% in 2022

hospital room

3 healthcare data vulnerabilities to be mindful of in 2023

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

February 16, 2023

Executive Protection for Hospitals and Healthcare Facilities

A head of state needs heart surgery at your facility. High-profile members of a national sports team are getting updated vaccinations. What do you do when you get the call?

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing