These professionals represent the depth, breadth and diversity that make up women across all functions, roles and responsibilities within the security industry.
Security magazine presents its annual Women in Security awards program, honoring women who have shaped the security function at their organizations and the industry as a whole. These professionals represent the depth, breadth and diversity that make up women across all functions, roles and responsibilities within the security industry.
Privileged access management (PAM) is vital for enterprise security. With proper PAM tools, procedures and processes in place, organizations can lessen the risk of being the next data breach victim.
As new members join, security management teams must get ahead of the insider threat.
What steps can be taken to protect the organization's crown jewels, or known and unknown assets?
Lone offenders, the internet and social media are the biggest correlations between domestic and international terrorism. So why have Foreign Intelligence Surveillance Act (FISA) orders dropped by more than half in the last two years?
Insider threats can cause extensive damage to national security. To combat this threat, the U.S. must update and adapt current security practices, including the background check process.
Despite widespread support for the EU-backed Digital ID Wallet, security and data privacy concerns will need to be addressed, according to a new Thales survey.
Security magazine sits down with John Bartolac, Sr Manager, Industry Segments Team, Americas at Axis Communications, to discuss top security concerns in retail today and more.
UNESCO world heritage site Lumbini Park is visited by millions of international tourists each year. The security team monitors access via video surveillance and vehicle tagging systems.
CISA published the second version of Cloud Security Technical Reference Architecture (TRA), which seeks to guide agencies’ secure migration to the cloud by defining and clarifying considerations for shared services, cloud migration and cloud security posture management.