Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

ransomware

Most Active Ransomware Strains Targeting Enterprise Networks

david-balaban
David Balaban
June 4, 2020
Although the ransomware plague took a nosedive in terms of the victim count years ago, it’s still alive and kicking. It used to home in on any computers indiscriminately, but at some point, the malicious actors realized they could squeeze a lot more profit out of the enterprise than out of individual users. This shift made businesses the most coveted target for ransomware operators.
Read More
Coronavirus

Bipartisan Group of Senators Proposes Privacy Bill for COVID-19 Contact-Tracing Apps

david stauss
David M. Stauss
June 2, 2020

According to multiple sources, a bipartisan group of Senators plan to introduce a bill to regulate the use of contact-tracing and exposure notification apps. The bill, entitled the “Exposure Notification Privacy Act” is the latest in a series of bills that seek to regulate these new apps. The new bipartisan bill raises hopes that federal privacy legislation (albeit on a limited issue) may finally pass.


Read More
The Los Angeles Airport police have a full-time emergency services unit armed with rifles and a tactical team that provides protection in those areas along with patrol officers

Addressing Terrorism and Crime in Your City: Why the Public and Private Sectors Need to Work Together

Giovanni Gaccione
Giovanni Gaccione
May 26, 2020
All too often, business leaders, city planners, fire departments, and law enforcement focus on their mandates to the exclusion of others. Unfortunately, this approach can lead to a breakdown in communication and missed opportunities. In the worst cases, it can create a lapse in security that could make their city and its citizens vulnerable to criminal activity and terrorist attacks. But, by eliminating these silos and fostering strong communication, stakeholders can share information that allows them to quickly address evolving situations.
Read More

Is Your Security Guard Good Enough? Why Many Protection Agents Need More Training

Jonathan McKee
Jonathan McKee
May 26, 2020
What makes a quality security guard? What skills and traits embody someone that you would want to entrust with your life or the lives of your family? Most fail to realize that so much more goes into the making of a true professional protection agent than just an intimidating look and a gun. There is certainly more to it than the minimum standards required for licensure.
Read More
cloud-enews

Haven't Considered Cloud? Now may be the Time

Per Björkdahl
May 26, 2020
Ready or not, cloud is already making its impact on the industry. While it’s not a new technology to the industry, it continues to see growth, driven by growing possibilities in the IoT space. Security end users and their organizations are shifting to truly embrace the cloud, with worldwide spending on public cloud services and infrastructure forecasted to reach $210 billion in 2019 – an increase of 24 percent over 2018. Cloud services can provide benefits not only to large enterprise organizations, but small and mid-sized businesses as well by providing cost-effective solutions and increased flexibility.
Read More
Top 3 Misconceptions About Data After Death - Security Magazine

Using a Privacy-First Mindset to Transform Data into Intelligence

Robert Burcham
Robert Burcham
May 19, 2020
Why does the practice of Data Economy typically requires a solid understanding of the characteristics of the underlying data resource? And how can that data be transformed into useful intelligence, where these processes are carried out with the upmost care to represent the interests of the Data Subject?
Read More
coronavirus

For Scammers, a Pandemic is Just Another Opportunity

Paige Schaffer
Paige Schaffer
May 18, 2020
According to the Federal Trade Commission’s Report, from January 1st through April 15th, Americans have reported losing $13.44 million dollars to fraud and they’ve received 18,235 reports related to COVID-19. To avoid coronavirus scams, it’s crucial to understand and identify the red flags and behaviors of “fear scammers.”
Read More
cyber

Industrial Network Cybersecurity: Debunking the Myths and Adopting Best Practices

Alvis Chen
May 15, 2020
Why is cybersecurity so often overlooked by Operational Technology engineers? The answer can be traced to four common myths. Here, we explore why these four misconceptions are no longer true in today’s highly interconnected world and discuss the differences between IT and OT networks, and share some best practice guidelines to help your organization successfully overcome these IT-OT differences and transition to IIoT or Industry 4.0 systems.
Read More
coronavirus

How to Prepare for Risk Amid COVID-19

gunjan sinha
Gunjan Sinha
May 15, 2020
Heading into 2020 no one could have predicted how a then-mysterious new coronavirus would cripple global business, as it is now. The last time a global crisis struck with such force, it was a man-made event – when the subprime mortgage crisis in 2008 caused the worst recession in U.S. history since the Great Depression. What are four different dimensions of risk enterprise security leaders need to assess right now?
Read More
cybersecurity

Top Tips to Lockdown Remote Network Security Now

Amit Bareket
May 15, 2020

Though anticipating and preparing for the future is always smart business, there are some industries which take it a step beyond the norm. In cybersecurity, the concept of “future proofing” is essentially the modus operandi everyone adheres to considering just how quickly a massive breach can turn the tide on our collective defenses. By their very nature, security professionals are constantly preparing to head off new threats by diagnosing them and creating an active defense model that makes it nearly impossible - and absurdly expensive - for hackers to get at their data.


Read More
Previous 1 2 … 212 213 214 215 216 217 218 219 220 … 276 277 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

Coding

Epstein File Data Security Update: Raw Code Found in Emails

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing