Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » software as a service (SaaS)

Articles Tagged with ''software as a service (SaaS)''

rainbow digital fibers

Technology integration exposes infrastructure to cyberattacks

Security Staff
May 30, 2023

From the disruption of fuel distribution to the interruption of emergency healthcare services, cyberattacks are no longer confined to cyberspace.


Read More
people working together around laptop

68% of cybersecurity professionals work in a centralized IT model

Security Staff
May 8, 2023

A recent report by Torii found that 99% of IT professionals say they’re fulfilled in their jobs despite increasing SaaS spend concerns.


Read More
SEC-0423-ProdSpot-Header.jpg
Product Spotlight

RSA Conference 2023 product preview

Taelor Sutherland, Associate Editor
Taelor Sutherland
April 7, 2023

From hybrid-cloud solutions to risk management, Security magazine highlights recent products from security leaders attending the 2023 RSA Conference.


Read More
green computer chip

2022 saw a 61% increase in the rate of phishing attacks

Security Staff
March 14, 2023

A 2022 SaaS report by SaaS Alerts analyzed new threat vectors, key areas of concern and potential security gaps in SaaS applications. 


Read More
blue screen with code and light blue lock in center

Thirty-one percent of former employees still have company SaaS access

Security Staff
March 1, 2023

SaaS report quantifies the volume, types and exposure risk of business assets stored within the SaaS estates of medium and large companies. 


Read More
Warning cyberattack

Organizations need a strategic approach to attack surface management

Marc Gaffan
March 1, 2023

An automated approach to security enables organizations to leverage their resources, minimizing attack surfaces and effectively addressing threats.


Read More
Home office/remote worker

Network visibility and security gaps due to remote work challenge IT

Security Staff
February 9, 2023

86% of IT teams support a remote workforce, but only half are performing SaaS and cloud monitoring or Wi-Fi management in hybrid environments.


Read More
two people shaking hands

Building a stronger bond between IT and physical security

Roy Dagan
January 27, 2023

Physical security and IT teams need to work together when it comes to securing organizational networks and physical security technology.


Read More
computer screen with apps

Shadow IT risk: A dangerous connection

Andy Ognenoff Brian Soby
January 23, 2023

The connected nature of today’s IT ecosystems increases the risks associated with shadow IT, the act of using unapproved third-party apps and software.


Read More
employee using computer

Managing identity sprawl: How to take back control

Anna Nordström
January 11, 2023

Organizations need to take back control when it comes to identity and access management to avoid security and compliance risks.


Read More
Previous 1 2 3 4 5 6 7 8 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing