Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

org-security-freepik1170x658.jpg

Cybercrime: A clear and present danger

Sanjaya Kumar
March 3, 2022

Nine suggestions for defending your organization against cybercrime or cyberwarfare.


Read More
enterprise data

Data: The future of quantifying risk

Yair Kuznitsov
March 3, 2022

By using real-time data to predict enterprise risk, security leaders can mitigate future physical and cyber threats to their organizations.


Read More
phishing

4 tips for launching a simulated phishing campaign

Ellen M. Sturgeon head shot1569363024691 (1).jpg
Ellen M. Sturgeon
March 2, 2022

A cybersecurity tactic to reduce ransomware and increase security awareness: simulated phishing campaigns. Here are four considerations for enterprise security leaders thinking about adopting the cyber defense technique.



Read More
alert-freepik1170x658.jpg

Wiperware (pseudo ransomware) used in Ukraine cyberattacks

matt-warner.jpg
Matthew Warner
March 2, 2022

As tensions flare between Russia and Ukraine, the term wiperware or pseudo ransomware may pop up. Let’s break down what this means. 


Read More
cyber security

4 critical security strategies to prevent cyberattacks in 2022

Tyler Farrar
March 1, 2022

Private-public collaboration, a focus on access control and more: Examine four strategies for enterprise security professionals looking to prevent future cyberattacks.



Read More
blockchain-tech-freepik1170.jpg

Security: The lock and the key to the future of blockchain

Ronhgui Gu.png
Ronghui Gu
February 28, 2022

For blockchain technology to fulfill its full potential, the security standard needs to mature and cybersecurity best practices must be followed. Or, it gets costly.


Read More
digital-ID-freepik1170.jpg

Following in Estonia’s footsteps: Blueprints for a successful digital ID

Kaarel Kotkas
February 25, 2022

Estonia and its modest population of 1.3 million people are leaps and bounds ahead of the rest of the world when it comes to secure e-identity. 


Read More
software-freepik1170x658 (1).jpg

How to manage the endemic nature of open-source software

Lesson from Log4J: Security vulnerabilities are not just high-profile events like the recently identified Log4J exploit, but rather an ongoing threat on many fronts that need constant attention.
Mike O'Malley
February 24, 2022

Why is open-source software risky, and how can security organizations protect against open-source exploits? 


Read More
data-center-freepik1170x658.jpg

Optimize your edge data center with virtual switch offloading

NAPA_CharlieAshton_Headshot1_9June21 (2).JPG
Charlie Ashton
February 24, 2022

Find out how to optimize server CPU usage in data centers to get improvements in efficiency. 




Read More
bots-freepik1170x658.jpg

Why scalper bots will be your worst security nightmare in 2022

Matthew Gracey-McMinn.Netacea.jpg
Matthew Gracey-McMinn
February 23, 2022

The use of scalper bots — a ploy that can reap and cost millions — isn't poised to slow down. In fact, it will rise exponentially in 2022 due to the following bot community trends.


Read More
Previous 1 2 … 97 98 99 100 101 102 103 104 105 … 267 268 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing