Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

data-breach-notification-freepik.jpg

The do’s and don’ts of communicating a data breach

Cody Chamberlain Headshot .jpeg
Cody Chamberlain
May 23, 2022

There are three key elements to implementing a successful data breach communication strategy; an incident response plan, consistent communication, and transparency. 


Read More
cyber security handshake

Jeffrey Aguilar named Los Angeles County CISO

Security Staff
May 23, 2022

Cybersecurity leader Jeffrey Aguilar has been named Chief Information Security Officer (CISO) at the County of Los Angeles.


Read More
reskilling-freepik1170.jpg

Reskilling workers can help meet the cybersecurity staffing challenge

Vishal Salvi (1) (2).JPG
Vishal Salvi
May 23, 2022

Reskilling should be one of the primary strategies companies use to build their cybersecurity workforce.


Read More
ransomware-freepik1170x658xtkh.jpg

Beware potential ransomware attacks on QNAP NAS products

Maria Henriquez
May 20, 2022

QNAP Systems urges users to update their network attached storage (NAS) devices to avoid exposure to the Deadbolt ransomware.


Read More
world map cyber

CISOs list top cyber threats to enterprises in 2022

Madeline Lauver
May 20, 2022

Chief information security officers (CISOs) from 14 countries list their top of mind cyber threats to their organizations.


Read More
power grid security

3 key cybersecurity trends in the energy sector

Maria Henriquez
May 20, 2022

Energy executives anticipate life, property and environment-compromising cyberattacks on the sector, according to new cybersecurity research by DNV.


Read More
cyber security

10% of IT leaders believe they can stop an advanced attack

Security Staff
May 20, 2022

90% of IT and cybersecurity professionals are not confident in their ability to stop an advanced cyberattack, according to the 2022 Global State of Security report from Infoblox.


Read More
hacker

Pro-Russia cyberattacks target Italian Senate, Eurovision

Madeline Lauver
May 20, 2022

Pro-Russia hacker group Killnet has claimed responsibility for cyberattacks on many Italian institutions, declaring "war" on 10 countries including the United States.


Read More
Rik-Kielbasa-4x5@300dpi-(2)-copy.JPG

Rik Kielbasa named Chief Compliance Officer at Truliant

Security Staff
May 20, 2022

As Chief Compliance Officer, Kielbasa adds responsibility for policies, procedures, improvement and new programs in Truliant’s compliance area.


Read More
biometrics-sec-freepik1170x.jpg

Biometrics: Flexible and effective across different industries

shiraz-kapadia.jpg
Shiraz Kapadia
May 20, 2022

Biometric technology delivers benefits to companies that use the units for workforce management, health screening, access control and more.


Read More
Previous 1 2 … 126 127 128 129 130 131 132 133 134 … 301 302 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing