Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » security operations

Articles Tagged with ''security operations''

uav-drone-freepik1170.jpg

Commercial and military drones in Ukraine: The evolutionary use and implications on security and safety

Bill Edwards Calibre BIO.jpg
Bill Edwards
May 25, 2022

The experimentation with drone warfare in Ukraine has opened our eyes to what is possible with easily accessible platforms. Security professionals must be mindful and prepared for commercial drone security threats.


Read More
ransomware-freepik1170x658xtkh.jpg

Beware potential ransomware attacks on QNAP NAS products

Maria Henriquez
May 20, 2022

QNAP Systems urges users to update their network attached storage (NAS) devices to avoid exposure to the Deadbolt ransomware.


Read More
biometrics2-freepik1170x.jpg

The pros and cons of biometric access control in university applications

Ricky Green
May 20, 2022

By harnessing the scalability of biometric technology, the university space is finding pros and cons to deploying these platforms.


Read More
biometrics-sec-freepik1170x.jpg

Biometrics: Flexible and effective across different industries

shiraz-kapadia.jpg
Shiraz Kapadia
May 20, 2022

Biometric technology delivers benefits to companies that use the units for workforce management, health screening, access control and more.


Read More
cyber-theft-freepik1170x658.jpg

Enterprise SIEMs detect fewer than 5 of the top 14 ATT&CK adversary techniques

Security Staff
May 18, 2022

Enterprise SIEMs contain detections for fewer than 5 of the top 14 ATT&CK techniques employed by adversaries in the wild.


Read More
video surveillance
Product Spotlight

Product spotlight on video surveillance

Madeline Lauver
May 16, 2022

From drone security footage to video wall management, Security magazine spotlights video surveillance solutions and tools.


Read More
ransomware917-freepik1170x658.jpg

Five years after the WannaCry ransomware attack

Cybersecurity experts offer takeaway lessons that still hold true today
Maria Henriquez
May 12, 2022

Five years after the WannaCry ransomware attack, ransomware continues to be one of the most significant cybersecurity threats facing enterprises in 2022. 


Read More
malware-freepik1170.jpg

Emotet becomes most common malware family in Q1 2022

Security Staff
May 12, 2022

Emotet has become the most common malware family detected in Q1 2022 (representing 9% of all malware captured), according to a new HP Wolf security report.


Read More
justice-lawsuit-freepik1170.jpg

SolarWinds data breach lawsuit takeaways for CISOs

A lawsuit alleges SolarWinds did not take adequate actions to prevent a data breach. Security executives offer insights into this complex case
Maria Henriquez
May 11, 2022

Security talked to cybersecurity leaders to gauge their feelings on how the SolarWinds lawsuit will have ramifications for both security leaders and organizations going forward.


Read More
key lock
Profile in Excellence

Building, managing, and transforming security into a business enabler

After several decades in the security field, Bob Thibodeaux has extensive experience building and managing cybersecurity programs and transforming security into a business enabler.
Maria Henriquez
May 11, 2022

Chief Information Security Officer at DefenseStorm Bob Thibodeaux is focused on reframing cybersecurity as a business enabler.


Read More
Previous 1 2 … 17 18 19 20 21 22 23 24 25 … 29 30 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing