Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

Lightbulb with gradient colorful background

Bridging the widening cybersecurity skills gap

Oleksak Headshot
Joe Oleksak
April 25, 2024

For executives and leaders in IT, security and business operations, the widening cybersecurity skills gap poses an urgent dilemma.


Read More
Meeting with laptop

73% of security professionals failed to act upon security alerts

Security Staff
April 24, 2024

Many small and medium-sized enterprises lack the resources and abilities to properly handle the large volume security alerts received. 


Read More
5 Minutes with Scott Reynolds
5 Minutes With

Automating a more resilient supply chain

Jordyn Alger, Managing Editor, Security
Jordyn Alger
April 24, 2024

As technology evolves, manufacturers can leverage new tools to reduce costs while improving accuracy, visibility and customer satisfaction.


Read More
Glasses on a laptop

Harnessing AI to bolster public sector cybersecurity

Carver headshot
Kynan Carver
April 22, 2024

AI can become the foundation for a future where agencies can proactively identify, understand and address cyber threats before it’s too late.


Read More
Person tapping AI app on phone

Security isn’t convenient, and that’s a big problem in the age of AI

Dana Simberkoff
April 22, 2024

With threats looming, here are three considerations for consumers and businesses to protect data privacy in the age of AI.


Read More
Dark figure coding on computer

The cat and mouse ransomware game may threaten smaller organizations

Ariel Parnes.jpg
Ariel Parnes
April 18, 2024

It is possible that cybercriminals will shift from a few large-scale, high-stake ransomware attacks to a broader array of smaller-scale attacks.



Read More
Computer screen displaying code

Are AI data poisoning attacks the new software supply chain attack?

Iyer Headshot
Sitaram Iyer
April 18, 2024

With rapid AI adoption happening across varying business units, maintaining the integrity of those systems is a growing concern.




Read More
Two people writing on whiteboard

AI security for CISOs: A dynamic and practical framework

Omar Khawaja Headshot
Omar Khawaja
April 17, 2024

Without the proper foundation or understanding of how to secure their AI systems and address key security concerns, innovation slows or gets stuck. 


Read More
Person working on laptop

Navigating cybersecurity in telecommunications: The FCC's 7-day rule

Michael Isbitski Headshot
Michael Isbitski
April 16, 2024

Under heightened national and economic security scrutiny, telecom operators must rise to the challenge. 


Read More
Glowing red and green connections

Rethinking network and security monitoring in the age of TLS 1.3

Scott Aken headshot
Scott Aken
April 16, 2024

The adoption of the TLS 1.3 creates a watershed moment for cybersecurity, revolutionizing encryption and data protection standards.


Read More
Previous 1 2 … 32 33 34 35 36 37 38 39 40 … 301 302 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing