Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » information security

Articles Tagged with ''information security''

5 Mins with Tiwari

5 Minutes with Mohit Tiwari

August 27, 2020
Here, we talk to Mohit Tiwari, CEO and co-founder of Symmetry Systems, about the current threat landscape, the role of CISOs and the unique challenges COVID-19 and work-from-home (WFH) pose to CISOs and security teams.
Read More
SEC0820-Data-Feat-slide1_900px.jpg

Handling customer data? Plan for security first

Ben Kelley
Ben Kelley
August 26, 2020
Regardless of industry, no company can escape the widespread reach and impact of data.  Whether a company is collecting account information from customers or aggregating platform usage data, handling large amounts of data has become the norm. While this creates boundless new opportunities for businesses in analytics and real-time decisioning, it also introduces new risks that organizations need to consider and prevent where possible.
Read More
information security analysts among highest paying jobs

Study finds Security Analysts among highest median salary for workers with bachelor’s degrees

August 26, 2020

In a new study published by AdvisorSmith, it found that among the top 25 highest paying jobs for bachelor degree holders, number 18 on the list was Security Analysts. The study also found that information security analysts earned an annual median salary of $99,730.


Read More
cyber6-900px.jpg

New research finds that the IT security skills gap is getting bigger

August 26, 2020
The shortage of skilled information security practitioners continues to grow around the globe. Based on 200 IT executives and contributors who primarily serve in information or IT security roles, this new research found that in the United States, for organizations with at least 500 employees, the average number of open positions enterprises are trying to fill is 1,324. For the largest percentage of respondents in this survey, that number increased between 1 percent and 25 percent over the last year, although that increase is higher for large enterprises.
Read More
Will Security Enterprises Survive the Digital Transformation? - Security Magazine

Top 5 digital transformation use cases in the public sector

Brandyn Campbell
Brandyn Campbell
August 25, 2020
Here are five key use cases to guide, help and support digital transformation efforts to better serve constituents and government employees.
Read More
SEC0819-5G-Feat-slide_900px

Building a secure bridge for point-to-point connectivity

Michael Abad Santos
Michael Abad-Santos
August 24, 2020
The year 2020 has served up some unprecedented challenges for the human race in every aspect, with wireless connectivity more important than ever. Particularly as millions continue to work and learn remotely, our connected world of devices, vehicles, homes and cities is expanding exponentially. According to a report from GSMA and ABI Research, the number of mobile subscriptions worldwide had already reached 8.1 billion by 2017 at an annual growth rate of 5.4 percent. It’s now predicted that by 2025 the number will increase to 9.8 billion, with 3G and 4G representing 51 percent of total subscriptions and 91 percent of the total traffic generated, while 5G subscriptions are expected to exceed 849 million.
Read More
SEC0219-data-Feat-slide1_900px

235 million TikTok, Instagram and YouTube accounts exposed in database breach

August 24, 2020
A database breach has exposed profile data for nearly 235 million users of TikTok, Instagram, and YouTube.
Read More

Study reveals shift in attack methods with an exponential increase of botnet and exploit activity

August 24, 2020

A new study by Nuspire outlines new cybercriminal activity and tactics, techniques and procedures (TTPs).


Read More

So, what is the safest password policy? It’s complicated

New Stu Sjouwerman CEO KnowBe4.jpg
Stu Sjouwerman
August 24, 2020
Let’s face it, passwords are a pain. As we’ve been pushed towards using longer and ever more complex passwords, and told to update them with increasing frequency, password management has become something of a headache. We’ve gone from simple, easy to remember passwords to 12- or 16-character passwords that must contain a mixture of upper and lowercase letters, numbers and symbols.
Read More
internet of things

IoT: The Internet of Threats and how users can defend themselves

Chris Clements
Chris Clements
August 24, 2020
According to IDC, by 2025 there will be 41.6 billion Internet of Things (IoT) devices, generating a massive 79 zettabytes (ZB) of data. To put that into perspective, in 2006, IDC estimated that the total amount of electronic data created and stored was a mere 0.18 ZB. This growing amount of data represents a vast and exponentially increasing attack surface, which poses a huge opportunity for cybercriminals and a seemingly insurmountable task for those responsible for protecting and securing it. This task is only made more difficult by the lack of regulation and security measures being built into IoT devices at present. As IoT looks to become a foundational aspect of our everyday lives, it’s vital we, as consumers, understand the threats posed to our devices and the data they store.
Read More
Previous 1 2 … 68 69 70 71 72 73 74 75 76 … 102 103 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing