Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

keys-cyber-enews

Three Steps to Reduce Insider Threats to High Value Legal Content

rachel teisch
Rachel Teisch
October 31, 2019
Law firms, their clients and all organizations face a volatile insider threat landscape, exacerbated by emerging technologies, interconnected and mobile devices, and new and evolving privacy regulations such as the GDPR and CCPA.
Read More
house of worship

Protecting Faith-Based Communities, Part 2

Part 2 of 2.
Maria Henriquez
October 30, 2019

There are many resources, techniques and practices that are no-cost or low-cost that houses of worship and faith-based communities can employ to protect their staff, community and their infrastructure. 


Read More
world map

Stemming Outbreaks of Violence in South Africa

frankbaldwin
Frank Baldwin
October 25, 2019
Despite being one continent, the countries within Africa are far from unified. Since apartheid, South Africa has been isolated from its neighbors and other countries across the continent, who made sacrifices to support the liberation movement. Recently, this separation from the continent and its people has escalated to violence against foreign nationals from elsewhere in Africa.
Read More
AI-enews

Why Enterprises Cannot Afford to Ignore AI and Emergent Technology in Their Cybersecurity Strategy

Marty Puranik
October 24, 2019
Thanks to advancements in Artificial Intelligence (AI) and Machine Learning (ML) in the area of cybersecurity, small businesses and enterprise-level companies can stay focused and maintain a high level of digital trust from their customers while keeping overhead costs in check.
Read More
cyber_lock

The Data Breach Avalanche: What is the Real Reason for Our Crumbling Defenses?

The technology to prevent data breaches exists, yet hackers are still breaking into major organizations with ease. A few best practices will help keep your sensitive data safe.
aman khanna
Aman Khanna
October 23, 2019
The volume and profile of data breaches are not only growing — they’re accelerating. In just one year, from 2018 to 2019, reported breaches jumped 54 percent. The first half of 2019 alone saw more than 4.1 billion compromised records due to hackers and poor security practices.
Read More
cyber-frame

Don’t Be Caught Unaware: Four Pieces of Cybersecurity Legislation to Watch

karnika arora
Karnika Arora
vlad eidelman
Vlad Eidelman
October 22, 2019
The proliferation of technology in our social fabric has made consumer data ever more accessible to companies, making data security a growing concern. According to a poll conducted by Polling the Nations, 92 percent of respondents wanted the Federal Government to put in a great deal of effort to combat cybersecurity threats. How then, is the government responding?
Read More
disaster

Situational Intelligence: The Foundation of a Risk and Resiliency Management Strategy

tj kuhny
T.J. Kuhny
October 22, 2019

What will you do when disaster strikes? How will you provide safety and security to your employees and facilities in the event of a natural or man-made catastrophe? What critical systems do you need to shut down during a cyberattack? Early minutes or seconds can make a difference between survival or disaster.


Read More
Complying with California's Workplace Violence Prevention in Healthcare Rule

Continuous Evaluation Is the Key to Preventing Workplace Violence

Tom Miller
October 22, 2019

Security can take multiple forms. There’s physical security, cybersecurity, and of course, security as it relates to workplace safety. It’s unethical to knowingly put employee and/or client lives on the line. Negligence can cost organizations a pretty penny in court, and especially in the wake of the mass shootings that have occurred in current and former places of employment this year, workplace violence is an issue that can’t be taken lightly.


Read More
The 'People' Part of Enterprise Cybersecurity Strategies

Stop the Abuse! (Of Your Cybersecurity Team)

avi chesla
Avi Chesla
October 22, 2019
CCIE’s – analysts with the highest network expert certification – are spending hours a day sifting through network logs, as are Networking experts, Cloud experts, Microsoft OS experts, application experts and other valuable employees.
Read More
house of worship

Protecting Faith-Based Communities

Part 1 of 2.
Maria Henriquez
October 21, 2019

Across the United States, Americans congregate in houses of worship. However, those soft targets are vulnerable, and recently, have been attractive targets for crime, active shooters and other threats. 


Read More
Previous 1 2 … 224 225 226 227 228 229 230 231 232 … 272 273 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing