• Home >
  • Back Issues >
  • Security Executive >
  • MAY-JUNE 2024
  • MAY-JUNE 2024

    Corporate Security

    More content from MAY-JUNE 2024

    Courtesy of DoorKing
    DoorKing's 1625 wedge barrier, a vehicle mitigation barrier that addresses a distinct yet significant threat.
    Sponsored
    DoorKing's 1625 wedge barrier is a vehicle mitigation barrier that addresses a distinct yet significant threat
    June 11, 2024
    Getty Images -- Credit: mediaphotos
    Amidst the myriad of tools available to evaluate threats and risks, it's empowering to know that contemporary security risk management practices have evolved.
    Knowing your organization’s risk appetite is critical in mitigating physical security risks
    June 11, 2024
    Getty Images -- Credit:Hugethank9
    One trend in organizations now involves looking at security not as “physical” or “cyber” but as a holistic frame of reference.
    What security leaders need to remember when creating a top-down holistic solution
    June 11, 2024
    Getty Images -- Credit:sasha85ru
    Adopting Zero Trust principles marks a pivotal shift in physical security systems, propelling them beyond traditional perimeter-based approaches toward a more dynamic and resilient framework.
    Embracing Zero Trust is not just a cybersecurity imperative but a fundamental guide for the safeguarding of physical assets
    June 11, 2024
    Getty Images -- Credit: metamorworks
    Securing data at the source in traditional on-prem deployments requires a multi-layered approach that includes physical security, network protection, and strict access controls.
    Securing traditional on-prem deployments and transitioning to hybrid cloud environments must be strategic
    June 11, 2024
    Getty Images -- Credit: iambuff
    In the dynamic security landscape, paradigms shift towards proactive, outcome-driven strategies aligning with business and operational objectives.
    Revolutionizing security in the digital era is a transformational process
    June 11, 2024
    Getty Images -- Credit: Nuthawut Somsuk
    Mentors, whether direct supervisors, colleagues, or collaborators, leave an indelible mark on our leadership journeys.
    In our pursuit of fortified enterprise security through effective leadership, the transformative power of mentorship is undeniable. Mentors, whether direct supervisors, colleagues...
    June 10, 2024
    Getty Images -- Credit: kali
    Lockdown drills have become common in the U.S., with over 40 states making them mandatory.
    During a 2022 committee meeting, Washington state Rep. Amy Walen raised an essential point about lockdown drills. Rep. Amy Walen's point about lockdown drills is crucial....
    June 10, 2024
    Getty Images -- Credit: tumsasedgars
    Your untrained people won’t rise to the occasion; they will sink to their level of training.
    When I enlisted in the U.S. Army, I wasn’t just issued a uniform and weapon and then deployed. I was sent to Fort Leonard Wood, Missouri for eight weeks of basic training...
    June 10, 2024
    Getty Images -- Credit: pearleye
    Cybersecurity start-ups are still making money for investors and this trend will continue, albeit with far less fanfare than pre-pandemic launches.
    In my previous column, I delved into the ever-shifting landscape of the cybersecurity market and its implications for practitioners. Now, I invite you to join me on a journey ...
    June 10, 2024
    Getty Images -- Credit: akinbostanci
    Invest in productivity training for you and your team and be rigorous about applying the principles you learn.
    Every day, we all have a lot on our plates. This is particularly true for leaders like us. We're not just ticking off our 'to-do' lists but also shaping and driving strategies...
    June 10, 2024
    Getty Images -- Credit: Edwin Tan
    The introduction of the vCISO has emerged as one of the latest trends in cybersecurity, particularly after the implementation of the SEC’s Cybersecurity Rules.
    The power of vCISOs for IT teams is a strategic move to enhance security and reign in cost
    June 10, 2024
    systemdeploymentandvalueassuranceforarticle
    Understanding Customer Value Both customers and service providers must grasp the difference between a technology “deployment” and an “installation” to ...
    June 10, 2024
    lasky_gsx1
    The frequency of enterprise and corporate data breaches has been as commonplace as men dressed in blue suits and donning long red neckties standing before microphones outside ...
    June 10, 2024
    bigbookspring_0524_2cover
    The security industry's buyer's guide
    May 20, 2024