Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

Abstract shape

78% of CISOs are experiencing impact from AI cyber threats

Security Staff
March 4, 2025

A report discusses the shifting role of AI in cybersecurity. 


Read More
Credit card

Hidden costs of compromised privacy: Protecting brands and customers

Barber headshot
Daniel Barber
March 4, 2025

Amid rising privacy concerns from consumers and increasing regulatory demands, today’s businesses are facing intense pressure to protect their customers’ privacy.


Read More
Presidential podium

Cybersecurity recommendations for the Trump administration

Wei Chen headshot
Wei Chen
February 28, 2025

To ensure continued progress, it is essential to maintain cybersecurity as a top national security priority.


Read More
Name tags

5 IAM considerations and lessons learned in the insurance industry

Crane headshot
Spencer Crane
February 27, 2025

A review of the top 5 customer IAM considerations and lessons learned for the insurance industry. 


Read More
Jordan Avnaim podcast news header

CISO strategies: Modern challenges and how to overcome them

Listen to Jordan Avnaim, Chief Information Security Officer at Entrust, in this podcast episode.
Security Staff
February 26, 2025

Jordan Avnaim, Chief Information Security Officer at Entrust, shares strategies CISOs can implement to overcome modern challenges. 


Read More
Padlock with computer keys

Automation alone isn’t enough to patch vulnerabilities — Here’s why

Kumar headshot
Dr. Deepak Kumar
February 26, 2025

Organizations need to consider how they approach patching as vulnerabilities increase in volume and complexity.


Read More
Red fibers

Open source software vulnerabilities found in 86% of codebases

Jordyn Alger, Managing Editor, Security
Jordyn Alger
February 25, 2025

86% of codebases had open source software vulnerabilities while 81% had high- or critical-risk vulnerabilities.


Read More
Man covered in notes

Automation gains traction as CISOs grapple with compliance challenges

Hoak headshot
Dale Hoak
February 25, 2025

As security leaders navigate increasingly complex technology environments, compliance with new and existing regulations remains a challenge.


Read More
Rendered stairway and door

Quantum computing could arrive soon due to Microsoft’s new chip

Jordyn Alger, Managing Editor, Security
Jordyn Alger
February 24, 2025

According to Microsoft, quantum computers could be built within years instead of decades, citing a recent breakthrough. 


Read More
Laptop in darkness

Cybersecurity risks organizations need to address this year

Eades headshot
Tim Eades
February 24, 2025

Organizations that don’t pivot to an asset-centric security model risk more than exposure — they’re inviting catastrophic breaches.


Read More
Previous 1 2 … 9 10 11 12 13 14 15 16 17 … 302 303 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing