This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

cyber laptop2

5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

mark voses
Marc S. Voses
December 5, 2019
Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.
Read More
cybersecurity-laptop

A Resilient Answer to Disasters

Ray-Rothrock
Ray Rothrock
December 5, 2019
Both disaster recovery and business continuity are answers to what happens when entropy strikes, things fall apart, and business is interrupted. Resilience is strategy using a set of tools and approaches that make it harder for things to fall apart, and easier and faster to put them back together when they do.
Read More
access card

Trends & Technology Dictate ‘Smart’ Future for Access Control

jeff barnhart
Jeffrey E. Barnhart
November 29, 2019
While access cards still play a strong role in the access control market, some companies are moving toward smartphone Bluetooth-enabled technology to give residents frictionless access through secured doors, elevators and turnstiles.
Read More
data-enews

The Need for Speed

alex feick
Alexander Feick
November 27, 2019
Why are mid-sized organizations increasingly putting their hope in Managed Detection and Response providers who focus on real-time triage and investigation into data breach signals as they happen?
Read More
internet of things

How IoT Helps Revolutionize and Optimize Airport Security

hartmut schaper
Hartmut Schaper
November 26, 2019
The Internet of Things (IoT) is living up to the hype. There are more than 20 billion end devices already networked through the Internet, with this number increasing more than three times by the year. In the process, end devices are becoming increasingly more intelligent and efficient, fueled by progress being made in artificial intelligence (AI), machine learning and even 5G, the new mobile phone technology, which creates the required bandwidths for data transfer in the IoT.
Read More
cloud-enews

Cloud Solutions: Four Key Areas of Focus

martin renkis
Martin Renkis
November 26, 2019
When it comes to cloud solutions, there are many questions regarding the migration process. To help with the transition, end users need to have a full understanding of what cloud is and what they would be getting. The security industry is conservative and can be slow to make changes, however it’s not a question of ‘if’ you might transfer to cloud, but ‘when.’
Read More
cyberinsurance

The Case for Automated Patch Management for SMBs

Simo Salmensuu
November 26, 2019
Though data breaches are a serious issue for large enterprise organizations, especially from a reputation perspective, the threat of compromise is a top concern for most small and midsized businesses (SMBs), too.
Read More
cyber threat

Addressing Data Breaches: How to Stop Them

monica pal
Monica Pal
November 26, 2019
There’s no 9-1-1 or insurance for consumers that can remediate the irreplaceable – your identity.
Read More
healthcare-screen

Tackling the “Shock and Awe” of Medical Device Security One Step at a Time

cheryl serra
Cheryl L. Serra
November 26, 2019
There is a healthy fear within the cybersecurity community that hackers can exploit security vulnerabilities in medical devices with relative ease, thereby endangering patients and putting a healthcare organization’s data assets at serious risk.
Read More
keys-cyber-enews

New Cyberattack Tactics Against Businesses Require Advanced Network Defenses

Bogdan Botezatu
Bogdan Botezatu
November 25, 2019
The cybersecurity skills shortage has reached an all-time-high, with 53 percent of organizations agreeing they have suffered from this gap.
Read More
Previous 1 2 … 169 170 171 172 173 174 175 176 177 … 220 221 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

  • clouds in sky
    Sponsored byMilestone Systems

    Smaller School Districts are Facing Infrastructure Growing Pains

Popular Stories

Cybersecurity-lock.jpg

47% of all internet traffic came from bots in 2022

criminal-on-laptop.jpg

T-Mobile confirms second data breach in 2023

multicolored text on black screen

ScanSource suffers ransomware attack

drone flies over landscape

Technology hones physical security threat assessments

multicolor text on black screen

Ransomware is being excluded from cyber insurance policies

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 6, 2023

Measure What Matters: The Top 10 Reports Every Security Leader Should Have

Are you ready to elevate your security game and take charge of your data-driven decision-making? As today's industry leaders know, data is key to driving impact and success.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
May 2023 Webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing