Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

Laptop with crumbled papers

Automation and a “back to basics” approach will shape cybersecurity

Kellerman headshot
David Kellerman
February 12, 2025

Security engineering teams are stretched thin, with their attention divided across cloud, automation, AI, containers, scalable environments, and dozens of other “urgent” priorities.


Read More
Blurry face

Will deepfake threats undermine cybersecurity in 2025?

Friedrich headshot
Gil Friedrich
February 12, 2025

To combat deepfakes, organizations need to implement fresh approaches to both employee education and cybersecurity.


Read More
Person working on two laptops simultaneously

88% of UK businesses say cyber fraud drove payment fraud

Security Staff
February 11, 2025

A recent U.K. cybersecurity report found that 93% of companies were targeted by fraud in the past year, with 73% expecting risks to grow in 2025.


Read More
Coding on screen

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

Watson headshot
Nicky Watson
February 11, 2025

As AI technologies rapidly evolve and become more integrated into our daily lives, data privacy concerns have never been more urgent. 


Read More
computer security
Global News

Data breaches affect consumer trust

Taelor Sutherland, Associate Editor
Taelor Sutherland
February 10, 2025

Data breaches impact consumer trust.


Read More
mobile device usage
Integrated Solutions

Managing risks in an evolving cybersecurity environment

An evolving mobile device threat landscape demands a multi-layered defense strategy.
Hughes headshot
John Hughes
February 6, 2025

An evolving mobile device threat landscape demands a multi-layered defense strategy.


Read More
Woman holding alarm clock

CISA’s communications guidance: A wake-up call for all industries

Lewis headshot
Phil Lewis
February 5, 2025

CISA’s guidance is not just a wake-up call for communications service providers. 


Read More
Laptop with coding

Report finds 1,025% rise in AI vulnerabilities, many tied to APIs

Security Staff
January 31, 2025

APIs have become a prominent attack surface over the past year. 


Read More
Laptop on table

Why SIEM’s obituary was written too soon

Njemanze headshot
Hugh Njemanze
January 31, 2025

There are a few fundamental ways SIEM will need to evolve for it to stay relevant and meet today’s cybersecurity challenges. 


Read More
Plasma ball

DeepSeek: What to know about the Chinese artificial intelligence model

Jordyn Alger, Managing Editor, Security
Jordyn Alger
January 29, 2025

Cyber experts delve into DeepSeek, the Chinese artificial intelligence model. 



Read More
Previous 1 2 … 10 11 12 13 14 15 16 17 18 … 302 303 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing