<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Services</title>
    <description>
      <![CDATA[Learn about different services to enhance enterprise risk and security.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2790</link>
    <language>en-us</language>
    <item>
      <title>Security’s 2025 Women in Security</title>
      <description>
        <![CDATA[<p>This year’s Women in Security honorees drive meaningful change within their organizations and help to shape the future of the security industry.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101739</guid>
      <pubDate>Mon, 07 Jul 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101739-securitys-2025-women-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/07-July/SEC-0725-F1-Intro-HERO-Slide-1440x750.webp?t=1752147912" type="image/jpeg" length="120564"/>
    </item>
    <item>
      <title>Security's Women in Security 2024</title>
      <description>
        <![CDATA[<p>This year's awardees are devoted change-makers in their organizations and the security industry as a whole.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100802</guid>
      <pubDate>Tue, 02 Jul 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100802-securitys-women-in-security-2024</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/07-July/SEC-0724-WIS-Hero-Slide1-1440x750.webp?t=1720868932" type="image/jpeg" length="117727"/>
    </item>
    <item>
      <title>Expanding the security candidate pool</title>
      <description>
        <![CDATA[<p>Expanding the security candidate pool is a critical step in better aligning security with the business and creating cross-functional teams.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99704</guid>
      <pubDate>Thu, 03 Aug 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99704-expanding-the-security-candidate-pool</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/July/SEC-0823-Candidate-Feat-Slide1-1170x658.webp?t=1690911856" type="image/jpeg" length="134390"/>
    </item>
    <item>
      <title>Security's Women in Security 2023</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security</em> magazine presents the honorees of our 2023 Women in Security program, representing the highest caliber of security leadership, dedication and skill within the security industry.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99549</guid>
      <pubDate>Wed, 05 Jul 2023 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99549-securitys-women-in-security-2023</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/July/SEC-0723-WIS-Intro-Feat-Slide1-1170x658.webp?t=1689351308" type="image/jpeg" length="99768"/>
    </item>
    <item>
      <title>US is short nearly 530,000 skilled cybersecurity staff, says new study</title>
      <author></author>
      <description>
        <![CDATA[<p><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Demand for cybersecurity pros remains high, according to data from CyberSeek. <span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The supply-to-demand ratio is currently 68 workers per 100 openings.</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98874</guid>
      <pubDate>Fri, 03 Feb 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98874-us-is-short-nearly-530-000-skilled-cybersecurity-staff-says-new-study</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/02/02/arlington-research-Kz8nHVg_tGI-unsplash.webp?t=1675353762" type="image/jpeg" length="112969"/>
    </item>
    <item>
      <title>Catherine Sendak joins CEPA as Director for Transatlantic Defense and Security</title>
      <author></author>
      <description>
        <![CDATA[<p>Catherine Sendak, a recognized thought leader on issues related to Russia, NATO, European defense and U.S. national security, joins CEPA.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98842</guid>
      <pubDate>Thu, 26 Jan 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/98842-catherine-sendak-joins-cepa-as-director-for-transatlantic-defense-and-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/01/26/handshake-g1b026bf33_1920.webp?t=1674763150" type="image/jpeg" length="58143"/>
    </item>
    <item>
      <title>Security’s 2022 Women in Security </title>
      <author></author>
      <description>
        <![CDATA[<em>Security</em> magazine presents its annual Women in Security awards program, honoring women who have shaped the security function at their organizations and the industry as a whole. These professionals represent the depth, breadth and diversity that make up women across all functions, roles and responsibilities within the security industry.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97884</guid>
      <pubDate>Fri, 01 Jul 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97884-securitys-2022-women-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC-0722-WIS-Feat-Slide1-1170x658.webp?t=1657306435" type="image/jpeg" length="116279"/>
    </item>
    <item>
      <title>What are national security professionals getting paid? </title>
      <description>
        <![CDATA[<p>Security professionals in some sectors earn higher wages than others. How do national security employees factor in? Learn the top-earning positions in government security, from IT roles to management.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97575</guid>
      <pubDate>Mon, 09 May 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97575-what-are-national-security-professionals-getting-paid</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/may/SEC-0522-News1-Feat-Slide1-1170x658.webp?t=1660665322" type="image/jpeg" length="76408"/>
    </item>
    <item>
      <title>5 minutes with Kevin Dooley, Sr. Director of Security and Transportation for the San Diego Padres</title>
      <description>
        <![CDATA[<p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><em>Security </em>speaks to K</span><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">evin Dooley, Senior Director of Security and Transportation for the San Diego Padres, about the approach his team is taking to fan and player safety. </span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95986</guid>
      <pubDate>Tue, 31 Aug 2021 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95986-5-minutes-with-kevin-dooley-sr-director-of-security-and-transportation-for-the-san-diego-padres</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/images/Kevin-Dooley.webp?t=1630430334" type="image/jpeg" length="78721"/>
    </item>
    <item>
      <title>Choosing the right security assessment service for your enterprise</title>
      <author></author>
      <description>
        <![CDATA[<p>Oftentimes, security leaders and organizations need more clarification about the types of cybersecurity assessment services. Let&#39;s look at the goal of each service, its scope and the methodology used.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95738</guid>
      <pubDate>Thu, 29 Jul 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95738-choosing-the-right-security-assessment-service-for-your-enterprise</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/survey-2316468_1280.webp?t=1627500862" type="image/png" length="37691"/>
    </item>
    <item>
      <title>What is facing your physical security peers heading into 2021</title>
      <author></author>
      <description>
        <![CDATA[The bottom line: The pandemic and other issues have put security weaknesses and new requirements into sharp relief. Travel limitations and other obstacles are hampering efforts to address these. To adapt and reopen, security managers have heightened expectations of their integrators to be more informed, transparent, and digitally advanced.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94008</guid>
      <pubDate>Tue, 24 Nov 2020 14:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/94008-what-is-facing-your-physical-security-peers-heading-into-2021</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC/2018/April/Security-Testing-for-Enterprise-Security-Magazine.webp?t=1521820840" type="image/jpeg" length="105892"/>
    </item>
    <item>
      <title>ISC West 2020 in-person event has been canceled</title>
      <description>
        <![CDATA[<p>ISC West 2020, scheduled for October 5-8 in Las Vegas, Nev., has been canceled due to industry and market circumstances.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/92690</guid>
      <pubDate>Thu, 25 Jun 2020 14:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/92690-isc-west-2020-in-person-event-has-been-canceled</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/isc-west1.webp?t=1583906646" type="image/jpeg" length="66652"/>
    </item>
    <item>
      <title>William Foos Named Director of Security and Safety Services at Gannett Fleming</title>
      <description>
        <![CDATA[Furthering a vision to elevate security and safety services as a critical component of operational reliability, Gannett Fleming recently named William Foos, CPP, PSP, to the position of director of Security & Safety Services. ]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/92175</guid>
      <pubDate>Fri, 17 Apr 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/92175-william-foos-named-director-of-security-and-safety-services-at-gannett-fleming</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/authors/WilliamFoos.webp?t=1587131941" type="image/jpeg" length="32900"/>
    </item>
    <item>
      <title>A Guide to Situational Awareness and Hospitality Protocols to Combat the Coronavirus</title>
      <author></author>
      <description>
        <![CDATA[Human resources departments (HR) handing out information sheets is not going to curb the spread of the Coronavirus (COVID-19). Training has to be conducted in concert and in person to all by the security department, as, it is a security threat. Here are some protocols and policy management procedures your enterprise and security department should consider to mitigate the spread of Coronavirus. ]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/91883</guid>
      <pubDate>Wed, 11 Mar 2020 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/91883-a-guide-to-situational-awareness-and-hospitality-protocols-to-combat-the-coronavirus</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC/2018/May/Enterprise-Ready-Coming-Pandemic-Security-Magazine-02.webp?t=1599588162" type="image/jpeg" length="61243"/>
    </item>
    <item>
      <title>How CSOs Can Strategically Keep Security on the Map, Part 2</title>
      <author></author>
      <description>
        <![CDATA[This series is focused on a step-by-step approach for security leaders to design, implement and measure a physical security program that supports organizational priorities and operates with buy-in from organization’s leadership team. Here, we'll explore the steps necessary for developing a risk mitigation strategy.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91869</guid>
      <pubDate>Tue, 10 Mar 2020 13:59:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91869-how-csos-can-strategically-keep-security-on-the-map-part-2</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/April/SEC0419-leadership-feat-slide1_900px.webp?t=1554091484" type="image/jpeg" length="74978"/>
    </item>
    <item>
      <title>The Impact of City Surveillance and Smart Cities</title>
      <description>
        <![CDATA[<p>How can city surveillance solutions ensure improved safety and better quality of living for citizens?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90109</guid>
      <pubDate>Wed, 10 Apr 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90109-the-impact-of-surveillance-smart-cities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/April/SEC0419-city-feat-slide1_900px.webp?t=1554926406" type="image/jpeg" length="207686"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/April/SEC0419-city-feat-slide1_900px.webp?t=1554926406" type="image/jpeg" medium="image" fileSize="207686">
        <media:title type="plain">SEC0419-city-feat-slide1_900px</media:title>
        <media:description type="plain">With an overall goal of reduced crime, improved safety and better quality of living for citizens in increasingly burgeoning communities, there are many positive outcomes of city surveillance solutions in published case studies across the nation, especially when it comes to targeting specific issues.
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/April/SEC0419-city-slide2_900px.webp?t=1554926590" type="image/jpeg" medium="image" fileSize="80304">
        <media:title type="plain">SEC0419-city-slide2_900px</media:title>
        <media:description type="plain">“Is it enough to just have the technology? Or, do we have to monitor it? Do we have to maintain it? I think the conversation has to be deeper than ‘We want to do cool stuff with cool gizmos,’” says Scot Walker, Managing Director at Sentinel Resource Group.
</media:description>
      </media:content>
    </item>
    <item>
      <title>Selling Your Security Guard Company?</title>
      <author></author>
      <description>
        <![CDATA[<p>Deciding whether, when and for how much to sell a security guarding business that you&rsquo;ve been building up over a period of decades has both financial and emotional ramifications.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89627</guid>
      <pubDate>Sat, 01 Dec 2018 10:23:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/89627-selling-your-security-guard-company</link>
    </item>
    <item>
      <title>How Social Media Can Enhance Your GSOC's Operations</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[<p>Global Security Operation Centers, or GSOCs, are a valuable tool in supporting an enterprise&rsquo;s global business goals and operations.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89521</guid>
      <pubDate>Fri, 26 Oct 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89521-how-social-media-can-enhance-your-gsocs-operations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Default-images/Responsive-Defaults/smartphone2-900px.webp?t=1472739459" type="image/jpeg" length="102238"/>
    </item>
    <item>
      <title>Our Executive is Missing: Kidnap and Ransom Basics for Security Professionals</title>
      <author></author>
      <description>
        <![CDATA[<p>Preparing for the worst is part of every security professional&rsquo;s repertoire, especially when it comes to planning for failure.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89400</guid>
      <pubDate>Thu, 13 Sep 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89400-our-executive-is-missing-kidnap-and-ransom-basics-for-security-professionals</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-kidnap-feature-slide1_900px.webp?t=1536766833" type="image/jpeg" length="82044"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-kidnap-feature-slide1_900px.webp?t=1536766833" type="image/jpeg" medium="image" fileSize="82044">
        <media:title type="plain">SEC0918-kidnap-feature-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-kidnap-slide2_900px.webp?t=1536766850" type="image/jpeg" medium="image" fileSize="58811">
        <media:title type="plain">SEC0918-kidnap-slide2_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-kidnap-slide3_900px.webp?t=1536766861" type="image/jpeg" medium="image" fileSize="42838">
        <media:title type="plain">SEC0918-kidnap-slide3_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Reducing the Impact of Unmanaged Insider Risk Through Continuous Evaluation</title>
      <author></author>
      <description>
        <![CDATA[<p>Every day in businesses across industries, there are myriad negative events occurring within a company&rsquo;s workforce, which can include full-time employees to part-time staff and contractors.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89391</guid>
      <pubDate>Fri, 07 Sep 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89391-reducing-the-impact-of-unmanaged-insider-risk-through-continuous-evaluation</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-checks-feature-slide1_900px.webp?t=1536345983" type="image/jpeg" length="81522"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-checks-feature-slide1_900px.webp?t=1536345983" type="image/jpeg" medium="image" fileSize="81522">
        <media:title type="plain">SEC0918-checks-feature-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-checks-slide2_900px.webp?t=1536346001" type="image/jpeg" medium="image" fileSize="58568">
        <media:title type="plain">SEC0918-checks-slide2_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-checks-slide3_900px.webp?t=1536346018" type="image/jpeg" medium="image" fileSize="57458">
        <media:title type="plain">SEC0918-checks-slide3_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/September/SEC0918-checks-slide4_900px.webp?t=1536346151" type="image/jpeg" medium="image" fileSize="50932">
        <media:title type="plain">SEC0918-checks-slide4_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Solution Integrates Emergency Management, Threat Intelligence &amp; More</title>
      <description>
        <![CDATA[]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89326</guid>
      <pubDate>Fri, 10 Aug 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89326-integrates-emergency-management-threat-intelligence-more</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC0818-gsx-worldaware-prod27-feat-slide_900px.webp?t=1533923350" type="image/jpeg" length="265242"/>
    </item>
    <item>
      <title>Can Automatically Trigger Mass Notification Alerts through Analytics</title>
      <description>
        <![CDATA[]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89321</guid>
      <pubDate>Fri, 10 Aug 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89321-can-automatically-trigger-mass-notification-alerts-through-analytics</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC0818-gsx-speco-prod22-feat-slide_900px.webp?t=1533922508" type="image/jpeg" length="33040"/>
    </item>
    <item>
      <title>Aids in Incident Management and Decision-Making</title>
      <description>
        <![CDATA[]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89316</guid>
      <pubDate>Fri, 10 Aug 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89316-aids-in-incident-management-and-decision-making</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC0818-gsx-genetec-prod17-feat-slide_900px.webp?t=1533921291" type="image/jpeg" length="132480"/>
    </item>
    <item>
      <title>Enables Organizations to Dynamically Locate and Communicate in Emergencies</title>
      <description>
        <![CDATA[]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89313</guid>
      <pubDate>Fri, 10 Aug 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89313-enables-organizations-to-dynamically-locate-and-communicate-in-emergencies</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC0818-gsx-everbridge-prod15-feat-slide_900px.webp?t=1533920826" type="image/jpeg" length="54366"/>
    </item>
    <item>
      <title>Simplifies Audio Management</title>
      <description>
        <![CDATA[]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89302</guid>
      <pubDate>Fri, 10 Aug 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89302-simplifies-audio-management</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC0818-gsx-axis-prod4-feat-slide_900px.webp?t=1533917835" type="image/jpeg" length="44015"/>
    </item>
    <item>
      <title>Provides Single Operational Window  for Alarm, Video and Event Management</title>
      <description>
        <![CDATA[]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89300</guid>
      <pubDate>Fri, 10 Aug 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89300-provides-single-operational-window-for-alarm-video-and-event-management</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/SEC0818-gsx-amag-prod2-feat-slide_900px.webp?t=1533917219" type="image/jpeg" length="107586"/>
    </item>
    <item>
      <title>Spotlight on New Security Technology at GSX 2018</title>
      <author></author>
      <description>
        <![CDATA[<p>As the Global Security Exchange nears, Security has a roundup of some of the new security solutions to be displayed and tested at the show.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89298</guid>
      <pubDate>Fri, 10 Aug 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89298-spotlight-on-new-security-technology-at-gsx-2018</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2018/August/GSX-2018/SEC0818-gsx-FEATURE-intro-slide_900px.webp?t=1533889329" type="image/jpeg" length="79452"/>
    </item>
    <item>
      <title>Is Voice the Next Stage for your Enterprise Security Program?</title>
      <author>Phil.Aronson@AronsonSecurity.com (Phil Aronson)</author>
      <description>
        <![CDATA[<p>As the industry moves toward holistic 360-degree security systems to satisfy business needs, security professionals are beginning to appreciate the role of voice in the equation.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89276</guid>
      <pubDate>Wed, 01 Aug 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89276-is-voice-the-next-stage-for-your-enterprise-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2018/August/SEC0818-corner-feat-slide1_900px.webp?t=1533148835" type="image/jpeg" length="81595"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/August/SEC0818-corner-feat-slide1_900px.webp?t=1533148835" type="image/jpeg" medium="image" fileSize="81595">
        <media:title type="plain">SEC0818-cyber-feat-slide1</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/August/SEC0818-corner-slide2_900px.webp?t=1533148988" type="image/jpeg" medium="image" fileSize="116745">
        <media:title type="plain">SEC0818-cyber-feat-slide2</media:title>
      </media:content>
    </item>
    <item>
      <title>Panda Restaurants Adds Business Intelligence Technology to 1,960 Stores</title>
      <description>
        <![CDATA[<p>3xLOGIC, Inc., a leading provider of integrated, intelligent security solutions, and a three-time <a href="http://www.3xlogic.com/news/3xlogic-ranked-by-deloitte-2017-fast-500">Deloitte Technology Fast 500&trade;</a> winner, today announced that Panda Restaurant Group, Inc. (parent of Panda Express, Panda Inn and Hibachi-San) has completed deployment of 3xLOGIC&rsquo;s VIGIL Trends Business Intelligence software to all of its North American locations.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89232</guid>
      <pubDate>Thu, 12 Jul 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89232-panda-restaurants-adds-business-intelligence-technology-to-1960-stores</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2018/July/Panda-restaurant-outside-2.webp?t=1531428316" type="image/jpeg" length="100574"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/July/Panda-restaurant-outside-2.webp?t=1531428316" type="image/jpeg" medium="image" fileSize="100574">
        <media:title type="plain">Panda restaurant outside</media:title>
        <media:description type="plain">Photo courtesy of 3xLOGIC
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/July/Panda-restaurant-location1.webp?t=1531428540" type="image/jpeg" medium="image" fileSize="108097">
        <media:title type="plain">Panda restaurant location</media:title>
        <media:description type="plain">Photo courtesy of 3xLOGIC
</media:description>
      </media:content>
    </item>
    <item>
      <title>How Intelligence Analysis Can Drive Corporate ROI</title>
      <author>davydoff@eurasiagroup.net (Daniil Davydoff)</author>
      <description>
        <![CDATA[<p>Go to any security conference and you&rsquo;ll be quick to discover that getting &ldquo;buy-in&rdquo; and maintaining a &ldquo;seat at the table&rdquo; are still the predominant concerns among security leaders. After all, unlike other business units that bring in revenue directly, corporate security must show that it is not merely a cost center but a cost- (and sometimes a life-) saver.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/89193</guid>
      <pubDate>Sun, 01 Jul 2018 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/89193-how-intelligence-analysis-can-drive-corporate-roi</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2018/July/SEC0718-edu-feat-slide1_900px.webp?t=1530548784" type="image/jpeg" length="102405"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2018/July/SEC0718-edu-slide2_900px.webp?t=1530548895" type="image/jpeg" medium="image" fileSize="55010">
        <media:title type="plain">SEC0718-edu-slide2_900px</media:title>
      </media:content>
    </item>
  </channel>
</rss>
