Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Featured Products
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
Security Enterprise Services RSS Feed RSS

healthcare worker
Integrated Solutions

Combat workplace violence with security technology

As Congress debates healthcare workplace violence prevention legislation, security leaders can look to technology to help employees stay safe at work.
John Nemerofsky
John Nemerofsky
August 15, 2022

Access control, weapons detection and visitor management systems are just some of the security technologies helping to prevent healthcare workplace violence.


Read More
security leader salary

How to protect cybersecurity budgets

Raj Dodhiawala
August 12, 2022

For chief information security officers (CISOs) and their organizations, the question is not if the cybersecurity budget should be cut. It's how much risk they are willing to take.


Read More
security-innovation-fp1170x658.jpg

Why it pays to be an early adopter of cybersecurity technology

Dr. Darren Williams
August 12, 2022

Chief information security officers (CISOs) must be early adopters and explore emerging cyber technology if they hope to keep ahead of cybercriminals.


Read More
employee-monitoring-fp1170x658.jpg

Avoid these employee monitoring blunders

Monique Zubicki
August 12, 2022

Employee monitoring needs to be approached correctly. Too often, poorly constructed plans, bad communication and unreasonable expectations get in the way of a successful implementation. 


Read More
threat
Enterprise Services

How security teams can combat social engineering and insider threats

By understanding how intelligence officers have traditionally recruited, assessed and developed spies for decades, security leaders can harden their organizations to bad actors.
Nicole Müller Elsine Van
August 12, 2022

Understanding how bad actors recruit and develop employees to share information can allow security leaders to harden their organizations against the threat of social engineering.


Read More
phishing-fp1170x658v90.png

The top identity-based attacks and how to stop them: Part 2

Part two of this two-part article series examines phishing and third-party account attacks, techniques and tools for mitigation, and tried and true best practices for reducing overall identity-based attack risk.
Slack Profile Photo.jpg
Gurinder Bhatti
August 11, 2022

Let's explore two top identity-based attacks — phishing and third-party accounts — and ways organizations can implement cybersecurity best practices to defend against these.


Read More
metaverse-security-fp1170.jpg

9 security threats in the metaverse

Security Staff
August 10, 2022

Let's examine nine different categories of threats against the metaverse and inside the metaverse, including cyber-physical crime, financial fraud, legal implications and more, according to Trend Micro.


Read More
G4S EU Election Observation Mission

Executive protection strategies secure election observation in Lebanon

Security Staff
August 10, 2022

Election observers from the European Parliament and other international organizations were protected by close protection officers and security technology from G4S during the 2022 Lebanon election.


Read More
tablet
Strategic Security

Transforming security from cost center to value add

Take a look at practical, real-world implementations from security leaders on shifting security from a cost center to a value add.
Alan Saquella
Alan Saquella
August 10, 2022

Investigative techniques can help shift security teams from an organizational cost center to a value add.


Read More
cyberspace-freepik1170x658.jpg

Deepfakes, cyber extortion, API attacks and other emerging cyber threats

Security Staff
August 8, 2022

Amid pandemic disruptions, burnout and geopolitically motivated cyberattacks, what are the challenges faced by security teams? VMware's Global Incident Response Threat Report shines a light on emerging cyber threats.


Read More
Previous 1 2 … 51 52 53 54 55 56 57 58 59 … 364 365 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

  • multi-site risk assessment
    Sponsored byAMAROK

    How Multi-Site Risk Assessments Can Guide Your Security Investments Portland Maine to Portland Oregon

  • hybrid cloud security
    Sponsored byRed Hat

    Maximizing business benefits with robust hybrid cloud security

Popular Stories

Credit card and padlock

5M unique credit and debit cards exposed in data breach

Donuts

Security experts respond to Krispy Kreme cyber attack

AI-powered phishing

Combating the rising threat of AI-powered phishing attacks

Water faucet and cup

Internet-exposed HMIs are a risk to water facilities, CISA warns

Monitor with coding

Nearly 400,000 WordPress credentials stolen

Profiles In Excellence

Security Magazine is looking to feature individuals that are showcasing excellence within the security industry!

Events

March 14, 2024

Balancing Act: Navigating Security Tech in Nonprofit Entertainment Sectors

ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security. 

March 19, 2024

Enhance Digital Forensics with Streamlined Analysis and In-Depth Investigations

ON DEMAND: Explore the latest developments in digital forensics with an in-depth look at FTK 8.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing