Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

data-enews

Small DDoS Attacks on the Rise: Why These Supersized Assaults Are Going Tiny

Rodney Joffe
November 21, 2019
Despite their reputation as brute force attacks, Distributed Denial-of-Service incursions are increasingly diversifying as hackers learn that smaller, more targeted attacks often deliver the anticipated outcomes while going under the radar.
Read More
terrorist1-900px.jpg

Deaths From Terrorism Down, but Number of Countries Affected by Terrorism is Growing

November 21, 2019

Deaths from terrorism fell for the fourth consecutive year, after peaking in 2014. The number of deaths has now decreased by 52 percent since 2014, falling from 33,555 to 15,952, says the 2019 Global Terrorism Index.


Read More
identity theft, fraud prevention, cybersecurity, data theft

Taking Stock of Your Data Security to Deliver a Happy Holiday Shopping Season

Tina Stewart
November 20, 2019
Retailers will be particularly susceptible to cyber crime during the most lucrative shopping weekend of the year: Black Friday and Cyber Monday.
Read More
business travel

Study Unveils 2020 Travel Risks & Country Medical/Safety Ratings

November 19, 2019

Heightened security threats, civil unrest and geopolitical instability are expected to be top disruptors to the mobile workforce in 2020, says a new study by International SOS.


Read More
Jeffrey Millslagle

Tyler ISD Names New Director of Safety & Security

November 19, 2019
Jeffrey Millslagle has been named the new Director of Safety and Security for the Tyler, Texas ISD.
Read More
cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

john sileo
John Sileo
November 18, 2019
It’s time to make cybersecurity personal for your employees, train them on best practices and reward them for their success. 
Read More
Chad Wolf

Chad Wolf Named Acting DHS Secretary

November 15, 2019

The United States Senate confirmed Chad F. Wolf to become the Under Secretary of the Department of Homeland Security (DHS) Office of Strategy, Policy, and Plans (PLCY).


Read More
cybersecurity

Obscure & Undetected: Hacking Into Hardware of Mission-Critical Infrastructure Using Side-Channel Attacks

alexander kesler
Alexander Kesler
November 14, 2019
A new vector of cybersecurity threats is on the rise – this time in hardware security.
Read More
cloud-enews

Top Challenges When Securing Cloud Services Today

Nati Hazut
November 13, 2019
There are many unique challenges involved with securing cloud services. First, data and applications in the cloud are distributed across many services and platforms; each with its own unique set of capabilities, logs and users.
Read More
server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

christopher gerg
Christopher Gerg
November 12, 2019

The implementation of a secured perimeter and internal firewall network architecture and conducting Vulnerability Assessments and Penetration Tests (VAPT) are often seen as enough to protect critical business information and guard against unexpected cybersecurity threats. However, as we will discover and despite this approach being a good start, there is substantially more to information security than firewalls and VAPT.


Read More
Previous 1 2 … 489 490 491 492 493 494 495 496 497 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing