Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • Annual Guarding Report
    • The Security Leadership Issue
    • Women in Security
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
  • SIGN UP!
Home » Topics » Management

Management
Management RSS Feed RSS

Mental Health, Stress Rates Climbing in U.S., Canadian Workplaces

Mental Health, Stress Rates Climbing in U.S., Canadian Workplaces

Sarah Sameei
March 1, 2017

Employee stress rates are reportedly high in companies within the United States and Canada, thus raising concerns regarding mental health, substance abuse and how a high stress environment impacts the workplace.


Read More
New Record High for Identity Fraud

New Record High for Identity Fraud

Sarah Sameei
March 1, 2017

According to Javelin Strategy and Research’s 2017 Identity Fraud Study..


Read More
According to Dr. Park Dietz, while lots of companies have crisis management plans that kick into gear in an emergency

Do No Harm: Profiling Evil and Violence in the Workplace

What Dr. Park Dietz wants you to know about mitigating workplace violence, zero tolerance policies, OSHA’s potential legislation and more.
diane-2016-200.jpg
Diane Ritchey
February 1, 2017

Workplace violence is seldom the freak episode that the media portrays it to be. It rarely involves a mass shooting with a gun, and rarely does it result in a homicide or mass casualty.


Read More
Could Wearables and Big Data Mitigate Workplace Violence?

Could Wearables and Big Data Mitigate Workplace Violence?

One promising technology for predicting violent outbreaks is wearables and big data.
Barry Nixon
Barry Nixon
February 1, 2017

One of the most frequently asked question after a workplace violence incident has occurred is how could it have been prevented from occurring?


Read More
Patrick Talty, general manager (right), and Billy Langenstein, Director of Event Services

2017 Security Innovation in U.S. Bank Stadium, Where Technology Is King

U.S. Bank Stadium is not just a location, but an epicenter of security technology, excitement and Minnesota pride.
diane-2016-200.jpg
Diane Ritchey
January 1, 2017

Get an exclusive first look at the security technology in U.S. Bank Stadium, the new fortress of football in Minnesota.


Read More
Revolving Door entryways

3 Ways Entrances Can Make Money for Your Enterprise

Tracie Thomas
November 22, 2016

We’ve all used different types of entrances as we move about in the world:  swing doors, sliding doors, revolving doors, gates and turnstiles. Aside from providing access into buildings, how many people consider that certain types of entrances can reduce costs and sometimes create opportunities to make money? 


Read More
cyber6-900px.jpg

Duplicate Alerts Draining Security Analysts' Time

New research shows that 30 percent of analysts' manpower is lost to duplicate alerts.
Garry Fatakhov Yair Stern
November 22, 2016

Essentially, one-third of analysts’ time is being spent on processing alerts that have unknowingly already been processed, and at present SOC teams are left with little ability to make this distinction resulting in massive manpower drain. 


Read More
supply chain images

7 Strategies to Defend Against Supply Chain Risks in the Digital Era

Javvad Malik
November 8, 2016

Even brick and mortar companies are increasingly leveraging the internet and cloud services to expand their business. As traditional business models have changed to incorporate these resources, the security risks presented have evolved as well. In today’s world of digital business, the security risks faced by the majority of companies have largely shifted into the cyber realm. 


Read More
Airport at Sunset

Enlisting Airport Employees to Help Mitigate Insider Threats

Mike Gelles Alex Mirkow
October 25, 2016

Airport authorities might consider augmenting existing practices with a program to help prevent, detect and mitigate insider threats. Such a program recognizes the airport for what it is – a complex ecosystem of airlines, vendors, contractors and airport employees – and provides a way for this community to come together to protect the aviation transportation system. In a sense, the airport community becomes an insider threat working group.


Read More
Cybersecurity Leadership Images

Assessing Cybersecurity Risk Through CISO and C-Suite Collaboration

Defining an organization's cybersecurity risk is a team effort.
Sean Curran David Chaddock
October 11, 2016

While an organization’s CISO focuses on cybersecurity, they depend on the C-suite to combine business operations and necessary security measures to find success.


Read More
Previous 1 2 … 534 535 536 537 538 539 540 541 542 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Lowes
    Sponsored byAxis

    Modernizing Retail Technology Operations to Improve Business Efficiency

  • Threat management
    Sponsored bySeerist

    Polycrises are Exhausting Your Security Team: Tips to Navigate the Challenges

  • image of electric security gate by AMAROK
    Sponsored byAMAROK

    Redefining Security: Proactive Measures Transform Industrial Protection

Popular Stories

Coding on monitor

Windows users targeted with zero-day attacks via Internet Explorer

Empty hospital room

McLaren Health Care experienced a criminal cyber attack

Person in hoodie on laptop

North Korean hacker tries to access KnowBe4, security leaders react

Two cellphones

Security leaders respond to the AT&T data breach

Doctor holding stethoscope

Security leaders respond to HealthEquity data breach

Profiles In Excellence

Security Magazine is looking to feature individuals that are showcasing excellence within the security industry!

Events

March 14, 2024

Balancing Act: Navigating Security Tech in Nonprofit Entertainment Sectors

ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security. 

March 19, 2024

Enhance Digital Forensics with Streamlined Analysis and In-Depth Investigations

ON DEMAND: Explore the latest developments in digital forensics with an in-depth look at FTK 8.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Secutiy Podcasts

Where security and risk professionals stay up to date on the latest issues affecting the enterprise.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey And Sample
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2024. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing