Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

us-capitol

Family affiliated extremism and the siege at the U.S. Capitol

Dean C. Alexander
February 22, 2021

Some 200 individuals have been charged with federal offenses connected to the siege at the U.S. Capitol on January 6, 2021. Among them are at least 15 examples of family affiliated extremism. These instances include: five sets of husbands and wives; two cases of fathers and sons, mothers and sons, brothers, and cousins; and an instance of father/daughter and brother/sister participation. Although of a different strain and less serious offenses—none specifically terrorism nor involving murder —such kin-connected radicalism is neither a new phenomenon nor one unique to the United States or elsewhere. 


Read More
5 mins with Prout

5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

Maria Henriquez
February 22, 2021
International SOS recently released its Risk Outlook report, unveiling the top security risks for the international workforce in 2021. Here, we talk to Jeremy Prout, Director of Security at International SOS, to discuss how to protect the workforce against the top risks found within the report. 
Read More
computer

Reshaping cybersecurity in the Remote Work Era

John Ayers
February 22, 2021

2020 and COVID-19 taught us a few things in the security industry: the importance of security awareness, speed of deployment is not always a good thing, and assuming new levels of risk such as “remote work force”. With so many challenges still on the horizon, here are some of the key topics to have on top of mind:


Read More
5 minutes with Bahar

5 minutes with Michael Bahar - The aftermath of the SolarWinds Orion breach

Maria Henriquez
February 19, 2021
As the cybersecurity community slowly recovers from the SolarWinds Orion breach, we speak to Michael Bahar, a leader in cybersecurity and privacy, about the aftermath of this attack. Bahar is a partner in the Washington D.C. office of Eversheds Sutherland (U.S.) LLP, and the firm’s Litigation practice. He was Deputy Legal Advisor to the National Security Council at the White House, former Minority Staff Director and General Counsel for the U.S. House Intelligence Committee, and a former Active Duty Navy JAG.
Read More
camera surveillance

How a 0G network can help home alarms systems provide the highest quality protection

February 19, 2021
One of the biggest threats to wireless security devices is radio jamming, which occurs when a malicious actor illegally purchases a radio frequency jammer tool and uses it to block alarm devices’ connections to their affiliated security company. If alarms can’t properly communicate through their network—which is typically cellular—then they cannot notify security providers when there’s a crisis.
Read More
cameras surveillance

Cloud-based solutions playing crucial role in current and future of commercial security space

Kim Hartman
Kim Hartman
February 19, 2021
An example of how businesses are benefitting from integrated cloud-based systems would be in the retail industry. Retail end users have integrated their security camera network, heat-mapping and video analytics technology with a cloud-based system so they can remotely monitor who is in their store. The heat-mapping and analytics technology also showcases where customers are spending the most time in their store, providing retailers with insight as to where they can place specific item displays or promotional items. This information can also be used to inform on if a specific location in a store needs additional signage to encourage social distancing, or even if it needs increased camera coverage within a store. The practical applications of integrated cloud-based systems and other security technology are nearly endless.
Read More
hack

French cybersecurity agency warns of intrusion campaign targeting Centreon

Maria Henriquez
February 18, 2021
ANSSI, the French cybersecurity agency, has reported an intrusion campaign targeting the monitoring software Centreon distributed by the French company CENTREON which resulted in the breach of several French entities. The first victim seems to have been compromised from late 2017. The campaign lasted until 2020.
Read More
ransomware - cyber

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

Maria Henriquez
February 18, 2021

Kia Motors America has allegedly suffered a ransomware attack by the DoppelPaymer gang. The gang is demanding $20 million for a decryptor and not to leak stolen data, according to news reports. 


Read More
risk management

Risk and compliance: A 2021 comeback strategy

Haywood Marsh
February 18, 2021
If the experiences of 2020 taught us anything, it’s that risk in the modern world cannot be understood or sufficiently mitigated with a siloed approach. Individual threats, such as regulatory risk and IT security, converge. Lacking a high-level view, it’s difficult to see the web of cause and effect – making it more difficult to anticipate, prepare, or mitigate the biggest risks. 2020 may be over, but the challenges remain in 2021. Compliance and risk management will need a shared umbrella of information and communication to tackle the complex, integrated risks of today’s landscape.
Read More
chess cyber

How insight-driven security builds business resiliency

Gidi Cohen
Gidi Cohen
February 18, 2021
The acceleration of digitization initiatives was paramount to ensure business continuity during this global crisis. As we rebuild economic stability in 2021, technology – especially automation and security – will play a significant role in positioning enterprises to return to growth.
Read More
Previous 1 2 … 217 218 219 220 221 222 223 224 225 … 300 301 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Code

Security Leaders Discuss the Marquis Data Breach

The White House

Trump Administration Issues New AI Executive Order

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing