Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

ransomware on laptop

How organizations can protect against phishing campaigns

Tonia Dudley
June 1, 2023

With cybersecurity threats on the rise, there are two crucial steps an organization can take to avoid falling victim to a credential phishing attack.


Read More
bots

Non-human identities: Secure them now, not later

Idan Gour
June 1, 2023

Now is the time to secure non-human identities — access tokens, integrations and authentication tools — to prevent future cyberattacks.


Read More
laptop-with-padlock.jpg

How security teams should respond to sophisticated ransomware attacks

Carlos Arnal Cardenal
May 31, 2023

As a constantly evolving form of malware, ransomware attacks only grow in sophistication and find new ways to steal business-critical data.


Read More
cloud-and-tablet.jpg

The 5 pillars of cloud security for data storage

Faye Ellis
May 31, 2023

Rather than debating the ways that the cloud is or isn’t inherently secure, leaders should question whether they are using the cloud securely. 


Read More
keypad on safe

The growing multifactor authentication imperative

Jay-Martin photo.jpg
Jay Martin
May 30, 2023

Using standard "enter your username and password" login credentials for any cloud-based resources is a security nightmare for IT teams.


Read More
laptop.jpg

Cybercriminals are winning: How companies can turn the tide

Jess Parnell
May 29, 2023

At no time in history have organizations spent as much money as they are right now on cybersecurity to prevent bad things from happening.


Read More
black and white concert photo

Strengthening concert fan safety with video analytics

Liam Galin
May 26, 2023

The responsibility of protecting performers, staff and visitors demands layers of planning and responsiveness driven by intelligent video solutions.


Read More
power lines and clouds

Protecting critical infrastructure with radar

Yaron Zussman
May 26, 2023

Utility organizations, like other critical infrastructure sites, are faced with ever-present challenges to protect facilities, people and assets.


Read More
man-adjusting-tie.jpg

Earning the “C” in CISO: Staying secure through economic turbulence

James Christiansen
May 25, 2023

With talk of a possible global recession this year, security professionals need to start anticipating the potential impacts to securing their organizations.


Read More
leader

Leadership is more than a noun

"The greatness of a leader is measured by the achievements of the led. This is the ultimate test of his effectiveness." — Gen. Omar Bradley
Andy Altizer, Westminster Schools & Georgia State University
Andy Altizer
Stan Crowder
May 25, 2023

Senior security leaders themselves must be willing to continuously learn how to strengthen their leadership abilities and inspire their teams.


Read More
Previous 1 2 … 55 56 57 58 59 60 61 62 63 … 277 278 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing