This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

digital-cyber

Orchestrating Cybersecurity Across the Business Ecosystem

A cyber leader’s guide to learning the business and providing precise support.
Matthew doan
Matthew Doan
November 7, 2019
Increasing a business’ digital competence is a need that’ll never go away; continual transformation is required to be competitive in the market. So much hinges on getting digital right that entire new disciplines and executive roles are springing up, including the Chief Digital Officer and Chief Transformation Officer. Change makes many people uncomfortable, but it’s a necessity.
Read More
c-suite

How to Increase Collaboration Between IT and Executive Leadership Teams

Christopher gerg
Christopher Gerg
November 7, 2019

For enterprises to implement cloud technology successfully, the C-Suite and IT teams need to work closely to coordinate and deliver a wide range of as-a-service technical offerings. How can enterprises increase the relationship between the board and tech teams and help to develop a prosperous, collaborative partnership?


Read More
cyber network

Cybersecurity: A View From the Middle

Gilbert morales
Gilbert Morales
November 7, 2019
Cybersecurity can be a scary beast for any organization of any size. The stakes are high. The adversaries are sly. The landscape is always shifting.These challenges can be especially significant for small and medium-sized businesses that have limited resources in capital and specialized expertise.
Read More
keys-cyber-enews

Three Steps to Reduce Insider Threats to High Value Legal Content

Rachel teisch headshot
Rachel Teisch
October 31, 2019
Law firms, their clients and all organizations face a volatile insider threat landscape, exacerbated by emerging technologies, interconnected and mobile devices, and new and evolving privacy regulations such as the GDPR and CCPA.
Read More
house of worship

Protecting Faith-Based Communities, Part 2

Part 2 of 2.
Maria Henriquez
October 30, 2019

There are many resources, techniques and practices that are no-cost or low-cost that houses of worship and faith-based communities can employ to protect their staff, community and their infrastructure. 


Read More
world map

Stemming Outbreaks of Violence in South Africa

Frankbaldwin
Frank Baldwin
October 25, 2019
Despite being one continent, the countries within Africa are far from unified. Since apartheid, South Africa has been isolated from its neighbors and other countries across the continent, who made sacrifices to support the liberation movement. Recently, this separation from the continent and its people has escalated to violence against foreign nationals from elsewhere in Africa.
Read More
AI-enews

Why Enterprises Cannot Afford to Ignore AI and Emergent Technology in Their Cybersecurity Strategy

Marty Puranik
October 24, 2019
Thanks to advancements in Artificial Intelligence (AI) and Machine Learning (ML) in the area of cybersecurity, small businesses and enterprise-level companies can stay focused and maintain a high level of digital trust from their customers while keeping overhead costs in check.
Read More
cyber_lock

The Data Breach Avalanche: What is the Real Reason for Our Crumbling Defenses?

The technology to prevent data breaches exists, yet hackers are still breaking into major organizations with ease. A few best practices will help keep your sensitive data safe.
Amankhanna
Aman Khanna
October 23, 2019
The volume and profile of data breaches are not only growing — they’re accelerating. In just one year, from 2018 to 2019, reported breaches jumped 54 percent. The first half of 2019 alone saw more than 4.1 billion compromised records due to hackers and poor security practices.
Read More
cyber-frame

Don’t Be Caught Unaware: Four Pieces of Cybersecurity Legislation to Watch

Karnika arora
Karnika Arora
Vlad eidelman
Vlad Eidelman
October 22, 2019
The proliferation of technology in our social fabric has made consumer data ever more accessible to companies, making data security a growing concern. According to a poll conducted by Polling the Nations, 92 percent of respondents wanted the Federal Government to put in a great deal of effort to combat cybersecurity threats. How then, is the government responding?
Read More
disaster

Situational Intelligence: The Foundation of a Risk and Resiliency Management Strategy

Tj kuhny
T.J. Kuhny
October 22, 2019

What will you do when disaster strikes? How will you provide safety and security to your employees and facilities in the event of a natural or man-made catastrophe? What critical systems do you need to shut down during a cyberattack? Early minutes or seconds can make a difference between survival or disaster.


Read More
Previous 1 2 … 165 166 167 168 169 170 171 172 173 … 214 215 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

2023 Top cyber security leaders

Security's 2023 Top Cybersecurity Leaders

Empty conference room

Cyber risk is a business risk

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

CT scanner

Cybersecurity threats to medical devices are a growing concern

laptop phone.jpg

31% of organizations had users fall for phishing attack

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing