Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

SEC0219-data-Feat-slide1_900px

How Data Tokenization Affords Analytical Value

Warren Poschman
Warren Poschman
June 15, 2020
Recently, data tokenization has proved to be a successful protection method for securing sensitive information and all instances of personal data. This is because it allows information to retain its analytical value, while ensuring that it meets regulatory requirements.
Read More
SEC1219-cybergap-Feat-slide1_900px

Cellular Connectivity at the Forefront of Network Security

Donald Schleede
June 15, 2020
Embedding cellular technology in a business continuity plan allows organizations to scale the network as needed, offers further security for those outside the corporate walls and ensures IT teams can more easily monitor and resolve any potential issues faster and easier. The workforce of tomorrow will see remote work security and cellular connectivity go hand-in-hand.
Read More
trafficking

INTERPOL Assesses COVID-19's Effect on Migrant Smuggling and Human Trafficking

June 12, 2020
INTERPOL released an assessment outlining COVID-19's short and long-term effects on migrant smuggling and human trafficking. 
Read More
visitor management

Why Visitor Management is Critical for Business Continuity During and Post-COVID-19

gregory blondeau
Gregory Blondeau
June 12, 2020
What are seven concrete steps you can put in place to address visitor management in this crisis situation and during your recovery phase for re-entry to the office?
Read More
cyber 3 responsive default

Taking a Closer Look at Remote Workplace Fraud Vulnerabilities: How to Mitigate Escalating Threats

Christina Quaine
Christina Quaine
June 11, 2020
As a future of remote work comes into focus, IT and security professionals are becoming increasingly aware that employees could unknowingly leave a door open to fraud, cybercrime and more.
Read More
David Fairman

David Fairman Named CSO for Asia-Pacific Region for Netskope

June 10, 2020

David Fairman has been named Chief Security Officer (CSO), APAC for Netskope.


Read More
5 minutes BRUEMMER.jpg

5 Minutes with Michael Bruemmer

June 10, 2020

Michael Bruemmer is Vice President of the Data Breach Resolution group and Consumer Protection at Experian. Why does he believe security serve as a calming force during the COVID-19 pandemic?


Read More
Cyber Incident Recovery

Security Awareness Training – Keys to Delivering a Successful Program

Gretal Egan
Gretel Egan
June 9, 2020
Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of cybersecurity best practices and learn how to detect and defend against targeted attacks. This shift in priority is needed to address an ongoing trend in the larger threat landscape. Cybercriminals have moved away from complicated, time-consuming technical exploits to concentrate on end users, a large and frequently vulnerable attack surface. Small or large, nearly every attack now begins in the same way: by relentlessly targeting people through email, social networks, and/or cloud and mobile applications.
Read More
Regulatory Changes Top C-Suites’ List of Enterprise Risks for 2017

Selling Security to the C-suite

John Nemerofsky
John Nemerofsky
June 9, 2020
Convincing C-suite executives to approve budgets for security system upgrades may be difficult in the best of times. However, the COVID-19 pandemic and resulting financial upheaval it caused may make selling new projects more challenging for security directors. While security may not be a daily topic of discussion among C-suite members, they understand the need to provide and maintain a safe and secure environment for corporate employees and visitors. But they don’t see security in terms of a camera brand or access card technology. They view security in terms of risk management and mitigation strategies. Addressing those concerns in any project plan will increase its chances of it winning approval.
Read More
SEC0818-perimeter-feat-slide7_900px

New Capabilities in Smart Surveillance Helps Security Contribute to Building Wellness

fabio marti
Fabio Marti
June 9, 2020
The Internet of Things (IoT) continues to be a driving force behind smart buildings, with the ability to optimize all areas of building operations – from HVAC to surveillance, offering massive potential for facility owners and system integrators to create added value for customers. While goals such as reducing energy consumption and space utilization are still priorities, building owners and operators are searching for solutions to help make workspaces and common areas safe and useable, abiding by new health and safety guidelines. Security professionals are also searching for ways to leverage and augment their technology infrastructure to contribute to the overall safety of their facility, beyond the traditional capabilities of access control and surveillance.
Read More
Previous 1 2 … 271 272 273 274 275 276 277 278 279 … 294 295 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing