Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » threat landscape

Articles Tagged with ''threat landscape''

Work from home permanent changes evolves the threat landscape for the enterprise

Salesforce becomes latest tech giant to embrace permanent work from home

February 11, 2021
What are the consequences to the organization, to the cities they reside in, to workplace efficiency and, of course, to the evolving security landscape? The answers are unknown, but the opportunities are plentiful.
Read More
Working from home makes new cyber challenges for chief security officers

When the threat landscape includes people’s homes

Santha Subramoni
January 28, 2021

With so many working from home, the cyber hygiene of employee homes has become a more central concern to those overseeing security inside today’s enterprises. The bottom line for every organization is that its attack surface has greatly expanded, altering traditional cybersecurity roles. Security within the enterprise needs to reshape to fit this new reality.


Read More
Lessons learned COVID-19 from a CISO for a CSO

Lessons learned: Six COVID-19 takeaways for CISOs from a CISO

Chris Jacquet
Chris Jacquet
January 25, 2021

The CoVID-19 pandemic is a gold-mine for lessons learned when it comes to security and cybersecurity at the enterprise level. Listen to Chris Jacquet, CISO at Hatachi Vantara, talk about the lessons he’s learned to keep his enterprise safer.


Read More
Malware

Malware activity spikes 128% in Q3

November 17, 2020
The Q3 2020 Threat Landscape Report by Nuspire demonstrates threat actors becoming even more ruthless. Throughout Q3, hackers shifted focus from home networks to overburdened public entities, including the education sector and the Election Assistance Commission (EAC). Malware campaigns, like Emotet, utilized these events as phishing lure themes to assist in delivery.
Read More
Software-as-a-Service

The 6 stages of a holistic hardware security development lifecycle

Vernetta Dorsey
Vernetta Dorsey
November 16, 2020
Building security and privacy into product development is more critical today than ever before. First introduced through the Microsoft Trustworthy Computing initiative in the early 2000s, the well-known security development lifecycle (SDL) is a framework designed to do just that. It was originally devised to enhance software security, but an SDL process can and should be applied to all types of products to help root out security and privacy vulnerabilities, while establishing long-term resilience in the rapidly evolving threat landscape.
Read More
comm bank

Balancing customer relationships and security

Case study
matt tengwall
Matt Tengwall
September 18, 2020
To meet modern day challenges and address the evolving retail bank landscape, Origin Bank embraces innovative technology and solutions that boost efficiencies, reduce fraud and enhance service. The organization considers the protection of its clients’ assets to be paramount and strives to deliver a safe banking experience.
Read More
SEC0619-Cyber-Feat-slide1_900px

The changing threat landscape in today’s cybersecurity

Dr. Kevin Harris
Dr. Kevin Harris
September 16, 2020
Thoughts around threat landscapes commonly prioritize corporate and governmental networks assets as high priorities, with personal networks and resources as lower-level threats. However, there have been recent changes that have caused the reassessment of prioritization levels at times. As a result of the COVID-19 pandemic, the number of individuals who work from home has greatly increased. In fact, Stanford researcher Nicholas Bloom places the percentage of people currently working at home at over 40%.
Read More
6 Steps Toward a Better Cyber Risk Management Strategy

CISA releases updated guidance on essential critical infrastructure workers

August 19, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) released an update to its Essential Critical Infrastructure Workers Guidance. Version 4.0 provides guidance on how jurisdictions and critical infrastructure owners can use the list to assist in prioritizing the ability of essential workers to work safely while supporting ongoing infrastructure operations across the nation.    
Read More
cyber6-900px.jpg

Making the business case for security by design

rodney joffe
Rodney Joffe
August 6, 2020
Organizations need to evolve their thinking around cybersecurity to stay ahead of these changing threats. A holistic approach that effectively builds security into all infrastructure and processes from the ground up is cost-effective and necessary to safeguard valuable employee and customer data. This requires an overall shift in philosophy – and adopting the concept of security by design is a key first step. 
Read More
ports 3 responsive default security

Maritime and port security agencies join forces to advance maritime security resilience

July 29, 2020
Multiple maritime and port security agencies announced a collaborative initiative, the “Maritime Security Resilience Alliance” that has unified advancing global Maritime security resilience (physical, cyber, cognitive – disinformation and misinformation) by accelerating information sharing, coordinated response and adoption of best practices supported by education.
Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing