Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

christopher gerg
Christopher Gerg
November 12, 2019

The implementation of a secured perimeter and internal firewall network architecture and conducting Vulnerability Assessments and Penetration Tests (VAPT) are often seen as enough to protect critical business information and guard against unexpected cybersecurity threats. However, as we will discover and despite this approach being a good start, there is substantially more to information security than firewalls and VAPT.


Read More
bullying

Promoting a Safe Learning Environment

mahsa karimi
Mahsa Karimi
November 12, 2019
For many children, the excitement of being at school is tempered by caution and worry. While active shooter incidents grab headlines and are terrifying, school bullying is occurring both on and off school campuses every day.
Read More
AI-cyber

Beyond Business Intelligence – Using AI to Gain Sharper Insights From Your Loss Prevention Data

jason wolfgang
Jason Wolfgang
November 12, 2019

The data analysis best practices from years past are not irrelevant; in the Loss Prevention world, we’re simply able to build on them to keep getting better at reducing fraud and shrinkage within operations. How can Artificial Intelligence take the efforts of your best talent and your Business Intelligence plan and help make them better?


Read More
cyber-shield

The State of Healthcare Cybersecurity and the Dark Web Economy

Rick McElroy
November 12, 2019
There are few industries where the cybersecurity stakes are higher than in the healthcare space, with medical organizations running the risk of life-threatening disruptions at the hands of malicious actors.
Read More
digital-cyber

Orchestrating Cybersecurity Across the Business Ecosystem

A cyber leader’s guide to learning the business and providing precise support.
matthew doan
Matthew Doan
November 7, 2019
Increasing a business’ digital competence is a need that’ll never go away; continual transformation is required to be competitive in the market. So much hinges on getting digital right that entire new disciplines and executive roles are springing up, including the Chief Digital Officer and Chief Transformation Officer. Change makes many people uncomfortable, but it’s a necessity.
Read More
c-suite

How to Increase Collaboration Between IT and Executive Leadership Teams

christopher gerg
Christopher Gerg
November 7, 2019

For enterprises to implement cloud technology successfully, the C-Suite and IT teams need to work closely to coordinate and deliver a wide range of as-a-service technical offerings. How can enterprises increase the relationship between the board and tech teams and help to develop a prosperous, collaborative partnership?


Read More
cyber network

Cybersecurity: A View From the Middle

gilbert morales
Gilbert Morales
November 7, 2019
Cybersecurity can be a scary beast for any organization of any size. The stakes are high. The adversaries are sly. The landscape is always shifting.These challenges can be especially significant for small and medium-sized businesses that have limited resources in capital and specialized expertise.
Read More
keys-cyber-enews

Three Steps to Reduce Insider Threats to High Value Legal Content

rachel teisch
Rachel Teisch
October 31, 2019
Law firms, their clients and all organizations face a volatile insider threat landscape, exacerbated by emerging technologies, interconnected and mobile devices, and new and evolving privacy regulations such as the GDPR and CCPA.
Read More
house of worship

Protecting Faith-Based Communities, Part 2

Part 2 of 2.
Maria Henriquez
October 30, 2019

There are many resources, techniques and practices that are no-cost or low-cost that houses of worship and faith-based communities can employ to protect their staff, community and their infrastructure. 


Read More
world map

Stemming Outbreaks of Violence in South Africa

frankbaldwin
Frank Baldwin
October 25, 2019
Despite being one continent, the countries within Africa are far from unified. Since apartheid, South Africa has been isolated from its neighbors and other countries across the continent, who made sacrifices to support the liberation movement. Recently, this separation from the continent and its people has escalated to violence against foreign nationals from elsewhere in Africa.
Read More
Previous 1 2 … 224 225 226 227 228 229 230 231 232 … 273 274 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing