Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

API security

How to build more secure APIs

Jeff Williams
Jeff Williams
October 4, 2022

Software developers are under pressure to develop programs quickly, but security professionals must work with them to make sure APIs remain secure.


Read More
K-12 cybersecurity

How K-12 cybersecurity leaders can protect their schools this fall

Randy Watkins
October 4, 2022

K-12 school safety leaders can use cyber education initiatives to train students and staff to avoid cybersecurity risks.


Read More
small business owner

How COVID-19 has made small businesses more vulnerable to cyberattacks

Egidijus Navardauskas
October 3, 2022

The COVID-19 pandemic accelerated e-commerce initiatives for small businesses, but it also catalyzed increased cyberattacks and cybersecurity challenges.


Read More
data-protection-freepik1170x658v504.jpg

Data privacy is a challenge. Tech leaders have the solution

IT teams have the power to turn privacy into a value-driver.
Jonathan Joseph (4).jpg
Jonathan Joseph
October 3, 2022

Data privacy has grown so complex that it demands a technological solution, and it falls on cybersecurity and technology leaders to transform the way their organizations use data.


Read More
cybersecurity-awareness-fp1170x658v4.jpg

Password month? How we can make CSAM work for everyone

Ian McShane
October 3, 2022

The security community needs Cybersecurity Awareness Month, but we need to do it better in order to advance the mission of keeping people safe online.


Read More
risk-assessment-fp1170x658v467.jpg

Quantifying the risk of cybersecurity

Devin Jones
September 30, 2022

Chief information security officers (CISOs) can help the C-suite and their organization understand the importance of quantifying cybersecurity risk.


Read More
construction site

Why construction sites need proactive security

Justin Wilmas
September 30, 2022

Construction security leaders can use video surveillance, analytics and people to ensure perimeter security and access control in work zones.


Read More
data-privacy-freepik1170x6.jpg

Privacy and data protection in the wake of Dobbs

Heather Federman
September 29, 2022

What does data protection and privacy mean in reproductive rights in the wake of Roe v. Wade being overturned by the Supreme Court? 



Read More
handshake

Public-private cybersecurity partnerships are good for business

Kevin Orr headshot
Kevin Orr
September 29, 2022

Public-private partnerships benefit more than just national cybersecurity — they help drive enterprise success and business innovation as well.


Read More
cyber-theft-freepik1170x658.jpg

Initial access brokers: The new face of organized cybercrime

New Stu Sjouwerman CEO KnowBe4.jpg
Stu Sjouwerman
September 28, 2022

While there is no one-size-fits-all to security, here are some recommendations that organizations can use to reduce the threat of initial access brokers (IABs).


Read More
Previous 1 2 … 80 81 82 83 84 85 86 87 88 … 279 280 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing