This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

cyber network

Tipping the Scale for Effective Cybersecurity

Dustin hillard lg
Dustin Hillard
May 8, 2019
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.
Read More
hacking_enews

Three Key Learnings for CEOs from Last Month's ASUS Hack

Chris Hickman
April 30, 2019
Last month’s ASUS APT attack doesn’t come as a surprise to any security-conscious industry watcher – this highlights a long-standing flaw in many software supply chains today. Attackers have been engaged in spoofing websites, stealing credentials and gaining unauthorized access for years. Injecting malicious code into legitimate tools that are designed to protect represents the next evolution in putting companies and their customers at risk.
Read More
cyber-attack

The Cybersecurity Talent Gap = an Industry Crisis

Dave barton
Dave Barton
April 30, 2019
Both the government and the private sector are scrambling for talent. Thousands of information-security jobs are going unfilled as the industry in the U.S. struggles with a shortage of properly trained professionals. By one estimate, there will be 3.5 million unfilled cybersecurity jobs by 2021.
Read More
vendor selection

Many Vendors, Many Decisions: How Safeguarding your Vendor Selection Practices Can Help Reap Rewards for your Security Enterprise

Ken lamarca
Ken LaMarca
April 30, 2019
Many enterprises face challenges when choosing the right security partners to implement and maintain their systems. Security management places a premium on their specific physical security strategies, either because of the complexity of their needs, or the specific system demands and compliance regulations associated with their specific business classification. Therefore, the goal should be to partner with suppliers whose focus is to deliver the solutions that best fulfil desired system functionality and operations.
Read More
Cybersecurity Intrusion Detection

Leveraging Mass Notification to Enhance School and Campus Safety

Patscheckel
Pat Scheckel
April 24, 2019

School and campus safety is an ever evolving challenge. New threats emerge almost daily, and administrators and security personnel need a way to respond should students and staff face a dangerous situation. The foundation of any good safety plan is strong communication.


Read More
financial- enews

Cybersecurity Innovation and the Patent Landscape

Keith
Keith Bergelt
April 10, 2019
It can be expected that costs associated with cybercrime will rise in the near to medium term and have a material impact on the global economy – while putting individual citizens’ and corporations’ important data at risk by cyber criminals. Due to the convergence of an escalation in the number of security vulnerabilities, an increase in hacker capabilities and tools as well as new legislation being enacted in the European Union, the estimated costs due to cybercrime may be conservative.
Read More
globe- enews

Cybersecurity Trends To Watch For in 2019

Vijay bharti   ciso happiest minds
Vijay Bharti
April 10, 2019
Multiple cyber-attacks and compromise of personal information of millions of people globally show that the complexity and intensity of cybersecurity attacks are on the rise, and it could have broader political and economic ramifications. As cybercrimes become more lucrative and cybercriminals become smarter, cybersecurity too will have to be intelligence driven, enabling a swift response to the advanced attacks.
Read More
hacker- enews

Three Reasons Cybercriminals Continue to Succeed in Breaching Some of the Biggest Brands

Maxim frolov
Maxim Frolov
April 10, 2019
In 2018, we witnessed some of the biggest data breaches ever – affecting businesses and consumers alike. From social media, hospitality, healthcare and even mail delivery, 2018 proved that there is no escaping cybersecurity flaws, regardless of the type of business or its popularity. For example, we witnessed the data of approximately 500 million Marriot guests get breached and a USPS security flaw that exposed the personal data of more than 60 million people.
Read More
slashpro-1

How Slash Resistant Clothing Can Help Protect Security Professionals

Robert kaiser
Robert Kaiser
April 8, 2019
Many security professionals charged with either protecting us or our infrastructure have suffered from severe cut wounds during physical confrontations. Recently developed slash resistant clothing is set to make a real difference.
Read More
airport-enews

Security Around the Clock: Hotel Safety for the Mobile Workforce

Matthew bradley
Matthew Bradley
April 8, 2019
When traveling for business, it’s necessary for safety precautions to extend beyond the typical nine to five working parameters. Throughout the entirety of a business trip, business travelers should remain diligent around the clock, taking additional precautions to ensure their personal safety. There are several security measures both a business and its mobile workforce should keep in mind as they book business travel accommodations, check into their hotels in remote locations and conduct business while in an unfamiliar area.
Read More
Previous 1 2 … 177 178 179 180 181 182 183 184 185 … 214 215 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

2023 Top cyber security leaders

Security's 2023 Top Cybersecurity Leaders

Empty conference room

Cyber risk is a business risk

CT scanner

Cybersecurity threats to medical devices are a growing concern

laptop phone.jpg

31% of organizations had users fall for phishing attack

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing