Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

Machine Identity

Machine identities: What they are and how to use automation to secure them

Tim Callan
Tim Callan
August 16, 2021
Security teams who aim to control secure access to networked applications and sensitive data often focus on the authentication of user credentials. Yet, the explosive growth of connected devices and machines in today’s enterprises exposes critical security vulnerabilities within machine-to-machine communications, where no human is involved. 
Read More
convergence freepik

4 steps to prepare for a ransomware attack: A C-suite guide

Rob T. Lee
Rob T. Lee
August 16, 2021

Organizations should ready a comprehensive ransomware preparedness strategy ahead of time that is adapted depending upon the severity of an attack. Here are four steps leadership should follow in developing a ransomware response strategy. 


Read More
ransomware and the DOJ involvement

What the DOJ's involvement in cyberattacks means for the future of ransomware

August 13, 2021

As businesses navigate this new frontier, there are a number of key issues that they should consider, both for implementing their own cybersecurity protections, as well as adjusting expectations for government involvement in cyberattacks moving forward. 


Read More
Remote work and the cybersecurity flaws unveiled due to COVID-19

Remote work worked, until it didn’t

Matt Berzinski
August 13, 2021

COVID-19 created an identity and access weak point, but here’s how next-gen identity and access management can help.


Read More
cyber behaviors to watch from employees

Risky remote work behaviors your employees are probably guilty of right now

Trevor Collins headshot
Trevor Collins
August 12, 2021

From leaking company data to ransomware, remote employees have created a host of new challenges for security professionals. So how can security professionals work to better protect their organizations?


Read More
Energy sector security

An Industry in need: The demand for increased security measures and regulation of the energy sector

Alan Cunningham
August 12, 2021

As with most other business, economic, and governmental sectors that are imperative to daily life, the energy sector is at risk from a variety of threats both cyber and physical. What can be done?


Read More
RDP RIP

Remote Access Challenges: Should RDP RIP?

Tamir Hardof
August 12, 2021

Remote desktop protocol or RDP has been used for years as a remote access solution, but the pandemic rush to work from home sent thousands of RDP users and RDP enabled machines outside the classic network perimeter. Is RDP dead?


Read More
Video Surveillance as a Service will change come 5G

What does 5G mean for VSaaS?

Logan Bell
August 11, 2021

The rollout of 5G communications technology will impact video surveillance as a service in the months and years to come.


Read More
Vaccine passport identity

Vaccine passports must leverage decentralized identity solutions

Li Jun
August 11, 2021

As private enterprises and governments around the world look into vaccine passports for the future, security leaders must ensure that they are administered in the right way, so that we aren't taking away one problem and creating another.


Read More
healthcare security freepik

Health leaders, it’s time to prioritize cybersecurity culture and employee awareness

Sai V.
Sai Venkataraman
August 11, 2021
Here are three steps healthcare leaders across the U.S. should be considering immediately to secure and fortify their organization: 
Read More
Previous 1 2 … 142 143 144 145 146 147 148 149 150 … 276 277 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing