Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

phishing-fp1170x658v90.png

The top identity-based attacks and how to stop them: Part 2

Part two of this two-part article series examines phishing and third-party account attacks, techniques and tools for mitigation, and tried and true best practices for reducing overall identity-based attack risk.
Slack Profile Photo.jpg
Gurinder Bhatti
August 11, 2022

Let's explore two top identity-based attacks — phishing and third-party accounts — and ways organizations can implement cybersecurity best practices to defend against these.


Read More
email security threat

Email cyberattacks increased 48% in first half of 2022

Security Staff
August 11, 2022

Email security threats are increasing, according to the H2 2022 Email Threat Report from Abnormal Security.


Read More
computer

Austin Siders named CIO at the University of Southern Indiana

Security Staff
August 11, 2022

Austin Siders has been named Chief Information Officer (CIO) at the University of Southern Indiana, where he will lead tech and cybersecurity efforts.


Read More
network security

Fourth-party risk management is essential for software supply chain security

Michael Orozco
August 11, 2022

Cybersecurity leaders need to focus on fourth-party risks to their software supply chain. Are your vendors (and their partners) exposing you to risk?



Read More
AMA Meg West Security podcast
The Security Podcasts

AMA: Cybersecurity Leadership Edition — Meg West

Security Staff
August 10, 2022

Security sits down with Meg West, X-Force Cybersecurity Incident Response Consultant at IBM, to answer reader questions about enterprise cybersecurity insights, burnout and more in a new podcast episode.


Read More
G4S EU Election Observation Mission

Executive protection strategies secure election observation in Lebanon

Security Staff
August 10, 2022

Election observers from the European Parliament and other international organizations were protected by close protection officers and security technology from G4S during the 2022 Lebanon election.


Read More
blockchain internet network

Trust, transparency and reliability are keys to Web3 success

David Mahdi
August 10, 2022

Web3 is coming — what will that mean for enterprise security? This blockchain-based version of the internet may present new cybersecurity challenges.


Read More
tablet
Strategic Security

Transforming security from cost center to value add

Take a look at practical, real-world implementations from security leaders on shifting security from a cost center to a value add.
Alan Saquella
Alan Saquella
August 10, 2022

Investigative techniques can help shift security teams from an organizational cost center to a value add.


Read More
coffee shop franchise

Reducing cybersecurity risk for franchise businesses

Jennifer Kraxner
August 9, 2022

Franchise organizations have different levels of cyber risk to consider when it comes to identity and access management (IAM) practices.


Read More
phishing-security-freepik1170x658v4.jpg

Preventing email phishing attacks this summer with 3 defensive measures

Omer Taran, CTO & Co-Founder, CybeReady 2.jpeg
Omer Taran
August 9, 2022

3.4 billion phishing attacks are raining on us every day. With summer now upon us, it seems that everyone is on vacation. Here are three tips to get your business ready for phishing season.


Read More
Previous 1 2 … 162 163 164 165 166 167 168 169 170 … 640 641 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing