Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

lessons-ideas-freepik1170x658.jpg

3 security lessons we haven’t learned from the Kaseya breach

Dan-Schiappa.png
Dan Schiappa
July 1, 2022

The massive Kaseya security breach that impacted thousands forced the industry to re-evaluate their software supply chain security practices. Here we break down the cybersecurity lessons that still need to be learned. 


Read More
business-solution-freepik1170x658.jpg

2022 RSAC takeaways: Risk management vs compliance

Rob Gurzeev
July 1, 2022

Compliance is vital. But when it justifies the status quo, a compliance-only approach to cybersecurity can be counterproductive. However, the adoption of a risk management approach can be the most useful to enterprise cybersecurity teams.


Read More
cyber security

6 enterprise data breach and cybersecurity defenses

Richard Barretto
July 1, 2022

Lost files and records may cost more than you think. From encryption to insider threats, review these cyber defense tactics to protect against data breaches.


Read More
access-management-freepik1170x658 (1).jpg

Lessons learned from slew of recent data breaches

And, why is privileged access management vital for enterprise security?
Larry Chinski
June 30, 2022

Privileged access management (PAM) is vital for enterprise security. With proper PAM tools, procedures and processes in place, organizations can lessen the risk of being the next data breach victim.


Read More
insider-threats-freepik1170x658v13.jpg

Cybersecurity from the inside out — Guarding against insider threats

Joel Fulton
June 30, 2022

As new members join, security management teams must get ahead of the insider threat. What steps can be taken to protect the organization's crown jewels, or known and unknown assets?


Read More
surveillance-investigation-freepik1170x658.jpg

We need the Foreign Intelligence Surveillance Act more than ever

Brian-Gant.jpg
Dr. Brian M. Gant
June 30, 2022

Lone offenders, the internet and social media are the biggest correlations between domestic and international terrorism. So why have Foreign Intelligence Surveillance Act (FISA) orders dropped by more than half in the last two years? 


Read More
insider-threats-freepik1170x658v.jpg

Why insider threats pose unique risks to national security

Marc Packler.jpg
Marc Packler
June 29, 2022
Insider threats can cause extensive damage to national security. To combat this threat, the U.S. must update and adapt current security practices, including the background check process.
Read More
university campus

How to keep cybercriminals off university campuses

Rick McElroy
Rick McElroy
June 29, 2022

Cyberattacks have had drastic effects on universities and colleges, from the compromise of student and staff data to the permanent shuttering of higher ed institutions. Follow these five steps to bolster university cybersecurity posture.


Read More
SEC_Web_5Minutes-Bartolac-0822_1170x658.jpg
5 Minutes With

5 minutes with John Bartolac: Top security concerns in retail today

Maria Henriquez
June 28, 2022

Security magazine sits down with John Bartolac, Sr Manager, Industry Segments Team, Americas at Axis Communications, to discuss top security concerns in retail today and more.


Read More
third-party-supply-freepik1170x658.jpg

Contractors don’t have to increase your risk profile

How CISOs can extend the enterprise with secure third-party access
Mike Fey Headshot1.jpg
Michael Fey
June 27, 2022

Chief information security officers (CISOs) can safely embrace a modern security strategy to govern contractor access.


Read More
Previous 1 2 … 92 93 94 95 96 97 98 99 100 … 278 279 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing