Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

Woman instructing man

Mitigating human risk: Empowering a workforce to combat cyber threats

Kraemer headshot
Dr. Martin J. Kraemer
August 16, 2024

As cybercriminals gain access to increasingly sophisticated tools, they continue to target employees, regarding them as the most vulnerable element of an organization’s defense. 


Read More
Two people writing on whiteboard

How the NIST Cybersecurity Framework 2.0 helps protect businesses

Jay-Martin photo.jpg
Jay Martin
August 15, 2024

The NIST Cybersecurity Framework 2.0 is crucial for businesses aiming to enhance their cybersecurity posture.


Read More
Shaking hands

Lessons from the Snowflake breach: SaaS security needs collaboration

Guy Guzner
August 15, 2024

Companies should align their SaaS security strategies with their service providers so that everyone is clear on what role they should play in mitigating threats.


Read More
Stacked shipping containers

Supply chain cybersecurity and modern-day cargo theft

Ehrich headshot
Mike Ehrich
August 15, 2024

As cargo theft becomes increasingly sophisticated, companies must adapt. 


Read More
Human brain formed from connections

Reclaim the information advantage from cyber criminals

Ascoli Headshot
Nick Ascoli
August 14, 2024

Attackers don’t have to have the information advantage — security professionals can regain and maintain the information advantage.


Read More
Diamond tunnel

How to transform the defender’s dilemma into the defender’s advantage

Zeltser headshot
Lenny Zeltser
August 14, 2024

The notion that cybersecurity defenders are at an inherent disadvantage — the so-called defender's dilemma — is incorrect and counterproductive.


Read More
Man and women in office

Hybrid workplace vulnerabilities: Ways to promote online safety

Simister headshot
Aidan Simister
August 14, 2024

While remote working offers many benefits to employees, it can be a real headache for employers trying to secure their digital assets. 


Read More
Man with suitcase walking toward sunrise

Network security implications of the Great Resignation

Collins headshot
Tracy Collins
August 13, 2024

What are the network security implications of the Great Resignation, and how can out-of-band management help?


Read More
Single jigsaw piece

Why insider attacks are indicative of a need for security convergence

Ellie Gibson
August 13, 2024

In order to use security convergence to combat the growing threat of insider attacks, one must first understand key facts about the issue. 


Read More
Notebook with plan written on front

Closing the cybersecurity skills gap: 3 steps risk leaders must take

Sabbineni headshot
Prasad Sabbineni
August 13, 2024

The workforce issues plaguing the cybersecurity sector are no longer a trend — they’re an urgent call to action that leaders need to take steps to answer.


Read More
Previous 1 2 … 19 20 21 22 23 24 25 26 27 … 299 300 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing