Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » risk management

Articles Tagged with ''risk management''

artificial-intelligence-freepik

Assistive AI keeps the human element in public safety

Jack William
June 4, 2021

Artificial intelligence (AI) is the most disruptive innovation in a generation. It is quickly becoming an essential component in many industries, including public safety. However, these are still the nascent stages of AI adoption, and with that, come challenges.


Read More
Gary Johnson COVID_19 Heroes
COVID-19 Heroes

Gary Johnson of the Pojoaque Valley School District makes student and staff well-being priority number one

Director of Security for the Pojoaque Valley School District in New Mexico, Gary Johnson has taken a lead role in implementing COVID-19-related screening procedures, safety and security plans, and reopening protocols, but more importantly, he’s placed a focus on supporting students, staff and community members.
Maggie Shein
Maggie Shein
June 4, 2021

Gary Johnson is much more than Director of Security for the Pojoaque Valley School District in New Mexico. He’s in charge of safety and security, transportation and more, but his most important role is supporter, with this role becoming even more prominent in the wake of the COVID-19 pandemic.


Read More
NFL GSOC COVID Heroes
COVID-19 Heroes

The NFL’s GSOC takes center stage in getting players back on the field

As the centralized place for intelligence and information, the NFL’s GSOC played a pivotal role in the League’s pandemic response, streamlining access and infection control, updating business continuity plans, and providing relevant data to enable all stakeholders to make informed decisions.
Maggie Shein
Maggie Shein
June 4, 2021

As a centralized place for intelligence and information, the NFL’s GSOC, led by Director of Intelligence Operations Robert Gummer, played a pivotal role in the League’s pandemic response, streamlining access and infection control, updating business continuity plans, and providing relevant data to enable all stakeholders to make informed decisions.


Read More
banking freepik

93% of fraud attacks occur online

June 3, 2021
Feedzai has announced its Quarterly Financial Crime Report, an analysis of over 12 billion global banking transactions from January – March 2021. The report identifies trends in spending and in fraud attempts to show that this past quarter, as consumer activities increased, fraudsters attempted to hide their fraudulent transactions in legitimate banking. In fact, combining all banking fraud  – internet, telephone, and branch – attacks grew a whopping 159% in Q1 2021 compared to Q4 2020. 
Read More
adrian asher

Adrian Asher named CISO at Checkout.com

June 3, 2021
Checkout.com, cloud-based global payment solutions provider, announced the hire of J.P. Morgan cybersecurity expert and cloud evangelist Adrian Asher as Chief Information Security Officer (CISO) and head of cloud architecture. 
Read More
convergence freepik

When product security and cybersecurity converge: A CSO’s perspective on how security organizations can thrive

John Scimone
John Scimone
June 3, 2021
To more effectively reduce risk and capitalize on the capabilities, intelligence and experience of both the corporate application security team and the product security team, John Scimone, Dell Technologies Chief Security Officer, recommends converging these programs. Once converged, the security organization will see immediate benefits. Here, Scimone explores why organizations should converge these teams and the benefits.
Read More
incident response freepik

Behind the scenes of a ransomware attack and response

Marc Bleicher
June 3, 2021
Threat actors are now not only encrypting critical business systems, but also backups. They’ve brought businesses to a standstill, leaving some non-operational and really, with no good options for recovery. In many cases, it’s been pay the ransom to obtain a decryption key — or go out of business.
Read More
DevOps freepik

Just 3% of organizations have real-time visibility into runtime vulnerabilities

June 3, 2021
Software intelligence company Dynatrace announced the findings of an independent global survey of 700 CISOs, which reveals the rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security. As organizations shift more responsibility "left" to developers to accelerate innovation, increasingly complex IT ecosystems and outdated security tooling can slow releases by leaving blind spots and forcing teams to manually triage countless alerts, many of which are false positives reflecting vulnerabilities in libraries that are not used in production.
Read More
5 mins with Natalie Kelly

5 minutes with Natalie Kelly, Visa's Senior Vice President and Global Head of Payment Ecosystem Risk

Maria Henriquez
June 3, 2021
Throughout the pandemic, the payments threat landscape was largely influenced by the ongoing COVID-19 pandemic. Cybercriminals continued to employ tried and true methods, such as phishing, payment account enumeration, eCommerce skimming, ransomware, among others to exploit many vulnerabilities during the pandemic, says Natalie Kelly, Visa’s SVP, Global Head of Payment Ecosystem Risk. Here, we talk to Kelly about the payments fraud ecosystem, her role at Visa, ensuring business continuity through the evolution of the payments threat landscape and more. 
Read More
ransomware cyber freepik

Emerging COVID-19 threat landscape: Remote workforce and remote learning

james opiyo
James Opiyo
June 3, 2021

Some opportunistic cybercriminals have taken advantage of the pandemic environment to breach both consumer and organizations’ data. These cybercriminals are using COVID-19-themed emails as an opportunity to unleash ransomware attacks on organizations and consumers. Here, we focus on Remote Workforce and Remote Learning as areas that cybercriminals will continue targeting in 2021 and beyond, and explore mitigation strategies that may help reduce cybersecurity risks related to these areas.


Read More
Previous 1 2 … 161 162 163 164 165 166 167 168 169 … 290 291 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing