Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

cloud-computing-freepik1170x658x3.jpg

Data privacy, security top challenges for cloud implementation

Security Staff
April 12, 2022

Security leaders are running into challenges such as controlling cloud costs, data privacy and security challenges, and lack of cloud security skills/expertise, according to Foundry research.


Read More
cloud security

4 ways to innovate enterprise cybersecurity

Security Staff
April 12, 2022

The "Security Innovation: Secure Systems Start with Foundational Hardware" report from Intel and the Ponemon Institute explores how and why cybersecurity leaders drive security innovation.


Read More
data-center-freepik1170x658.jpg

Storage: An essential part of a corporate cybersecurity strategy

Eric Herzog photo.jpg
Eric Herzog
April 12, 2022

Chief information security officers (CISOs) will need to take an end-to-end approach to stay ahead of cybersecurity threats this year and beyond. This entails evaluating the relationship between cybersecurity, storage, and cyber resilience.


Read More
workforce training

How to recruit the right cybersecurity talent

Julie Smith
April 12, 2022

From youth outreach to recruitment efforts in high schools, community colleges and universities, cybersecurity leaders can develop the cyber workforce and find talented candidates.


Read More
healthcare data security

Protecting healthcare data during the COVID-19 pandemic

Syam Mamidi
April 12, 2022

With an increase in healthcare-related data due to the COVID-19 pandemic, cybersecurity professionals can employ encryption, data anonymization and other techniques to ensure healthcare data security.


Read More
data-breach-freepik1170x658x4.jpg

SuperCare Health discloses data breach affecting 300k individuals

Maria Henriquez
April 11, 2022

California-based respiratory care provider SuperCare Health disclosed a data breach affecting more than 300,000 individuals.


Read More
Hunter-Joyce.jpg

Joyce Hunter appointed Advisory Board Chair at CyberArg

Security Staff
April 11, 2022

Security expert Joyce Hunter has been appointed as Chair of CyberAg’s newly established advisory board. 


Read More
API-sec-freepik1170x658.jpg

API security vulnerability in FinTech platform could have enabled account takeover

Security Staff
April 11, 2022

An API security vulnerability discovered in a FinTech platform could have allowed administrative account takeover (ATO), according to Salt Security. 



Read More
alert-fatigue-freepik1170x658.jpg

Alert fatigue crippling security operation centers

Discover how to improve alert fatigue and catch security threats
Wesley Mullins
April 11, 2022

As the cybersecurity industry grapples with the ongoing talent shortage, security operations centers (SOCs) are already overwhelmed, and a constant stream of alerts doesn’t necessarily make their jobs any easier. 


Read More
contract

Ashley Devoto named CISO at Cerberus Sentinel

Security Staff
April 11, 2022

Ashley Devoto has been named Chief Information Security Officer (CISO) at Cerberus Cyber Sentinel Corporation, where she will guide the firm's global cybersecurity strategy.


Read More
Previous 1 2 … 219 220 221 222 223 224 225 226 227 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing