Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

digital-ID-freepik1170.jpg

Following in Estonia’s footsteps: Blueprints for a successful digital ID

Kaarel Kotkas
February 25, 2022

Estonia and its modest population of 1.3 million people are leaps and bounds ahead of the rest of the world when it comes to secure e-identity. 


Read More
software-freepik1170x658 (1).jpg

How to manage the endemic nature of open-source software

Lesson from Log4J: Security vulnerabilities are not just high-profile events like the recently identified Log4J exploit, but rather an ongoing threat on many fronts that need constant attention.
Mike O'Malley
February 24, 2022

Why is open-source software risky, and how can security organizations protect against open-source exploits? 


Read More
data-center-freepik1170x658.jpg

Optimize your edge data center with virtual switch offloading

NAPA_CharlieAshton_Headshot1_9June21 (2).JPG
Charlie Ashton
February 24, 2022

Find out how to optimize server CPU usage in data centers to get improvements in efficiency. 




Read More
bots-freepik1170x658.jpg

Why scalper bots will be your worst security nightmare in 2022

Matthew Gracey-McMinn.Netacea.jpg
Matthew Gracey-McMinn
February 23, 2022

The use of scalper bots — a ploy that can reap and cost millions — isn't poised to slow down. In fact, it will rise exponentially in 2022 due to the following bot community trends.


Read More
data-room-freepik1170x658.jpg

Brands are trying on data clean rooms, but they’re not one size fits all

Bobby Atefi
February 22, 2022

While clean rooms are designed to allow data sharing with maximum security, different clean rooms are created with different levels of security. To build the dream clean room, enterprises must consider a host of security factors.


Read More
camera-freepik1170x658v67.jpg

Understanding and complying with the NDAA’s Section 889

John Bartolac_Axis Communications.jpg
John Bartolac
February 22, 2022

The NDAA's ban on components from specific Chinese companies has changed the face of the telecommunications and video surveillance markets. Due diligence is important. Here's how security leaders can continue to ensure compliance with the NDAA.


Read More
hacked-ir-freepik1170x658.jpg

Why industry experts recommend tabletop cybersecurity exercises

Boris Khazin
Boris Khazin
February 22, 2022

Simply having a cybersecurity incident response plan is no longer enough to protect organizations. Further build organizational resilience and readiness with tabletop exercises.


Read More
financial-data-freepik1170.jpg

4 security best practices to secure financial report data

Cliff Stanton
February 21, 2022

Four security processes that will ensure top-notch financial data security at all times.


Read More
cyber-security-freepik1170x658v486.jpg

Top 9 security predictions for 2022

Andre Durand
February 21, 2022

Within this rapidly evolving landscape, here are the nine key security trends that will shape how organizations should think about the year ahead.  


Read More
woman enters building

Four steps to entrance security success

Greg Schreiber.jpg
Greg Schreiber
February 18, 2022

Access management is a challenge for many enterprise security leaders. No matter the size of the organization, physical security professionals can follow these four steps to ensure the safety of their entrance security system.


Read More
Previous 1 2 … 103 104 105 106 107 108 109 110 111 … 272 273 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing