Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

risk-management-freepik1170x658v568.jpg

Risk management processes in US are falling behind

Security Staff
July 14, 2022

Despite complexities of risks, only a third of executives say their organizations have complete enterprise risk management processes in place, according to a new report by AICPA and NC State.


Read More
mobile app

Enterprises lack visibility into mobile app security

Security Staff
July 14, 2022

The State of Mobile App Security in 2022 report from Approov and conducted by Osterman Research identified concerning levels of enterprise confidence in their cybersecurity for mobile applications.


Read More
5G-security-freepik1170x658.jpg

Why secure deployment operations management is critical for 5G

Brett Cupta
July 14, 2022

You can’t overstate the importance of the current 5G rollout to the wireless industry. Nor can you exaggerate the seriousness of that rollout’s security risks without the right tools in place.


Read More
hacker

Material cybersecurity breaches increased 25% in 2021

Security Staff
July 14, 2022

A study from Skybox Security and conducted by ThoughtLab surveyed executives and analyzed the cybersecurity investments, practices and performance of 1,200 organizations.


Read More
people on cell phones

Disinformation is the next big cybersecurity threat

Wasim-Khaled-Headshot
Wasim Khaled
July 14, 2022

Misinformation, disinformation and malinformation (MDM) pose threats to enterprise and global security. Learning to monitor for these information attacks can help organizations identify MDM before it affects their business.


Read More
Erez Yalon

How to avoid common cybersecurity vulnerabilities

Listen to Erez Yalon, Vice President of Security Research at Checkmarx, in the latest Security podcast.
Security Staff
July 13, 2022

In a new podcast episode, Erez Yalon, Vice President of Security Research at Checkmarx, talks how security leaders can avoid common cybersecurity mistakes in their organizations.


Read More
busines-leaders-freepik1170x658v57.jpg

CISOs at SMBs face unique cybersecurity challenges

Security Staff
July 13, 2022

Cynet CISO survey reveals lack of staff, skills and resources are driving smaller teams to outsource security with advanced tools, technologies and services.


Read More
identity-cyber-freepik1170x658v6.jpg

Solving the identity crisis in cybersecurity

Mike_Sentonas.jpg
Mike Sentonas
July 13, 2022

CrowdStrike Chief Technology Officer Michael Sentonas explains why identity security must be an urgent priority for business leaders, as well as how zero trust helps contain adversaries in attacks involving identity.



Read More
power lines

Evolving cybersecurity to protect today’s energy network architecture

Mike Wood headshot
Michael Wood
July 13, 2022

In today’s world, where any energy organization can be a target for cyberattack, secure network architecture and end-to-end visibility are the building blocks to a resilient cybersecurity posture.


Read More
Secureworks_CTO.jpg

Michael Aiello named Chief Technology Officer at Secureworks

Security Staff
July 12, 2022

Michael Aiello has been named Chief Technology Officer (CTO) at Secureworks, a cybersecurity company.


Read More
Previous 1 2 … 108 109 110 111 112 113 114 115 116 … 301 302 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Red block among white blocks

Plenty of Associations, But Not Enough Association

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing