Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

cloud-computing-freepik

CISOs to developers: Changing the way organizations look at authorization policy

Torin Sandall
September 23, 2021

The open-source and developer community has adopted Open Policy Agent (OPA) as the de facto standard for authorization. There are three critical ways OPA can help organizations solve for authorization:


Read More
Man sits at computer facing camera

True vulnerability management involves much more than updates

Monique Hart
September 23, 2021

Vulnerability management requires a focus on the weaknesses that involve people, processes and business relationships, as well as technology.


Read More
phishing-email-freepik.jpg

Five lessons everyone needs to learn about phishing attacks

Zack Schuler
September 22, 2021

The first and last line of defense against phishing is always employees themselves. With that in mind, here are the top five things you need to know about phishing. 


Read More
cyber-incident-freepik

5 cybersecurity threats for businesses in 2021—and 3 tips to combat them

joe-banks.jpg
Joe Banks
September 22, 2021

Whether you build up in-house expertise or find a trusted outside partner, cybersecurity can no longer be a project set on the back burner. Let's walk through five prevalent cybersecurity threats for businesses, along with three helpful tips to combat them.


Read More
5_minutes_with_Kemper_1021_900px.jpg

5 minutes with Kat Kemper – Using security technology within healthcare to minimize risk, increase efficiency and reduce costs

Women in Security
Maria Henriquez
September 21, 2021

At HCA Healthcare, Kat Kemper, Director of Physical Security, has built the enterprise security program from the ground up, developing and implementing physical security measures to support patient care, privacy and overall security goals.


Read More
app-development-freepik.jpg

Mobile application fraud & abuse: Four things you need to know

Justin Lie
September 21, 2021

Here are four things you need to know about mobile fraud and abuse and what you can do to stop it.


Read More
Cybercrime

Tackling the cybercrime pandemic in 2021

David Cripps
David Cripps
September 21, 2021

Given the increase in attack sophistication over the years, it is imperative for security leaders to establish new rules of the road for risk management and cyber fraud prevention.


Read More
Classroom

Off-prem vs. on-prem access control for educational facilities

Chuck O'Leary
September 20, 2021

Many schools that are looking to in-person learning in the fall are deciding whether to select cloud-based, off-prem solutions or on-premises infrastructure. While there can undoubtedly be pros and cons for each, it ultimately depends on your organization’s needs.


Read More
risk-management-assessment-freepik7834.jpg

Embrace a holistic approach to vulnerability management

Joe Schorr
September 20, 2021

Identifying and scanning is an important aspect of vulnerability management, but it’s just one piece of the puzzle. Organizations failing to see the full vulnerability picture need to embrace a holistic approach with their vulnerability management program.


Read More
cyber-security-freepik-(80327).jpg

We are at war; a cyber war

Eric-Jeffery.jpg
Eric Jeffery
September 20, 2021

Is the U.S. in a cyber war? Here, Eric Jeffery, Sr. Solutions Architect for IBM Security, explores the scale of the latest nation-state sponsored cyberattacks. 


Read More
Previous 1 2 … 135 136 137 138 139 140 141 142 143 … 278 279 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing