Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

5mw Gardner

5 minutes with Dr. Tommy Gardner - How to accelerate U.S. supply chain and security innovation

Maria Henriquez
August 17, 2021
Dr. Tommy Gardner, Chief Technology Officer of HP Federal, believes a proactive mindset that bridges the digital divide, recruits top talent and implements the right policies is needed for the U.S. to achieve success and remain competitive on a global scale. Here, he discusses how a national strategy for critical technologies can shape the industries of the future as well as address national security and global challenges.
Read More
risk-management-freepik

Elevating governance, risk and compliance throughout the software development life cycle with digital risk management

Boris Khazin
Boris Khazin
August 17, 2021
As a more encompassing and modern approach that extends not only governance, risk and compliance capabilities but also Integrated Risk Management and Enterprise Risk Management, digital risk management provides new tools and techniques risk professionals can interweave into operations and technology with unprecedented detail to strengthening the enterprise.
Read More
TokyoOlympics unsplash

The Tokyo Olympics are a cybersecurity success story

Dr. Brian Gant
August 17, 2021
Over the course of these games, it’s become increasingly clear that the organizers did indeed exercise preventative measures and that despite the challenges and limitations of holding an Olympics during a pandemic, the Tokyo Olympics have been a real success story from a cybersecurity perspective. Organizers of all large-scale, televised sporting events—and indeed just all organizations in general—should look to this year’s games as a model to emulate.
Read More
fraud-freepik

Categorizing fraud types is the key to addressing risk

Chris Ryan
Chris Ryan
August 17, 2021
As businesses continue to navigate the current economic environment, it’s critical they also strategize for the future to position themselves for success once the environment improves. This means implementing robust fraud prevention strategies and tools that accurately separate fraud types to treat them correctly and address risk.
Read More
cybersecurity-data-protection freepik

Effective cyber risk mitigation requires a holistic mindset-shift

Tim Grieveson
August 16, 2021
Companies need to create a digital ecosystem where cybersecurity is an expectation, not an ‘add-on,’ writes Tim Grieveson, Chief Information Security Officer at AVEVA.
Read More
Machine Identity

Machine identities: What they are and how to use automation to secure them

Tim Callan
Tim Callan
August 16, 2021
Security teams who aim to control secure access to networked applications and sensitive data often focus on the authentication of user credentials. Yet, the explosive growth of connected devices and machines in today’s enterprises exposes critical security vulnerabilities within machine-to-machine communications, where no human is involved. 
Read More
convergence freepik

4 steps to prepare for a ransomware attack: A C-suite guide

Rob T. Lee
Rob T. Lee
August 16, 2021

Organizations should ready a comprehensive ransomware preparedness strategy ahead of time that is adapted depending upon the severity of an attack. Here are four steps leadership should follow in developing a ransomware response strategy. 


Read More
healthcare security freepik

Health leaders, it’s time to prioritize cybersecurity culture and employee awareness

Sai V.
Sai Venkataraman
August 11, 2021
Here are three steps healthcare leaders across the U.S. should be considering immediately to secure and fortify their organization: 
Read More
infrastructure-security-freepik

Why cybersecurity infrastructure must be prioritized in light of the IRS leak

Rizwan Virani
Rizwan Virani
August 11, 2021

As infrastructure trends as one of the top national priorities, the IRS leak is an important reminder that we need to prioritize innovation and security in our digital infrastructures. 


Read More
Data security data privacy public data

Curbing cybersecurity risks at the core with public online data collection

Omri Orgad
August 10, 2021

It is more critical than ever to prioritize fixing vulnerabilities to combat attacks and preserve valuable data by using advanced comprehensive technologies and solutions.


Read More
Previous 1 2 … 190 191 192 193 194 195 196 197 198 … 300 301 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing