Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

cyber6-900px.jpg

Data Breach Report in Capital One Litigation Not Privileged

Jeffrey Heuer
Jeffrey Heuer
June 5, 2020

On May 26, the District Court found in the In Re: Capital One Consumer Data Security Breach Litigation that a report prepared by Mandiant concerning the Capital One data breach (Breach Report) was not protected by the work product privilege and must be turned over to Plaintiffs. What are some lessons to be learned from this data breach litigation response?


Read More
Growing and Gaining

Recruiting the Future of Security: Finding Future CISOs

Jason Hicks CISO
Jason Hicks
June 4, 2020

It is no secret that finding and recruiting strong Chief Information Security Officer (CISO) candidates is far from easy. Many CISOs typically stay in a role for a few years and subsequently are not able to dedicate adequate time to the development of junior leaders who could become the next wave of security leaders. Most organizations are forced to look externally for the experience they require. However, looking for outside hires also contributes to the shortage of potential internal leaders, as skilled professionals are often overlooked. For the security industry to thrive, this needs to change, and it starts with grooming the next generation of leaders.


Read More
Fraud Cybersecurity Banking in Canada

Meeting 5G’s Extreme IoT Security Demands with Network-Based Solutions

angel fernandez
Angel Fernandez
June 4, 2020

According to a report from Cisco, 5G’s faster broadband (10 to 20 times faster than 4G) will enable 12 billion mobile-ready devices and IoT connections by 2022 compared to 9 billion in 2017. While this is great news for the rising number of smart device users globally, the increased connectivity can be taxing for IoT security. The combination of higher bandwidth and lower latency is a double-edged sword. While it enables new, exciting use cases like Vehicle-to-Vehicle and telemedicine, it is critical to not lose sight of the fact that it expands the scope of security threats, such as ransomware and botnets, among others.


Read More
ransomware

Most Active Ransomware Strains Targeting Enterprise Networks

david-balaban
David Balaban
June 4, 2020
Although the ransomware plague took a nosedive in terms of the victim count years ago, it’s still alive and kicking. It used to home in on any computers indiscriminately, but at some point, the malicious actors realized they could squeeze a lot more profit out of the enterprise than out of individual users. This shift made businesses the most coveted target for ransomware operators.
Read More
Mission 500

Mission 500 Launches M500 Club to Drive Participation in New Virtual Events

June 3, 2020

Mission 500, a charitable non-profit organization engaging security professionals to assist families in crisis across the USA, announces the launch of its 2020 foundational fundraising campaign – the M500 Club.


Read More
Coronavirus

Bipartisan Group of Senators Proposes Privacy Bill for COVID-19 Contact-Tracing Apps

david stauss
David M. Stauss
June 2, 2020

According to multiple sources, a bipartisan group of Senators plan to introduce a bill to regulate the use of contact-tracing and exposure notification apps. The bill, entitled the “Exposure Notification Privacy Act” is the latest in a series of bills that seek to regulate these new apps. The new bipartisan bill raises hopes that federal privacy legislation (albeit on a limited issue) may finally pass.


Read More
Myrna Soto

Security and IT Veteran Myrna Soto Joins Forcepoint as Chief Strategy and Trust Officer

June 2, 2020
Myrna Soto has joined Forcepoint as Chief Strategy and Trust Officer. In this newly-created role, Soto will serve as a strategic business and technology driver of the company’s enterprise vision, strategy and programs to protect people, critical data and IP both within the company and for thousands of Forcepoint customers around the globe.
Read More
SEC0819-Cyber-Feat-slide1_900px

Securing the Mainframe: How Companies can Empower Security Analysts to Protect the Backbone of Their Enterprise

Christopher Perry
May 29, 2020
To apply true holistic security best practices and reduce significant risks to the mainframe, security teams must embrace an integrated mainframe security strategy.
Read More
cyber_enews

As Organizations Become Aware of Security Vulnerabilities in Cloud-Based Collaboration Applications, It’s Time to Act

Dan Teichman
Dan Teichman
May 28, 2020
New security threats are surfacing every day, driving IT and security operations teams to quickly understand and address significant security threats.
Read More
Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

3 Lesser-Known Campus Security Challenges and How to Address Them

Stuart Rawling
Stuart Rawling
May 27, 2020
What are some often-overlooked campus security pain points, and how can they be addressed?
Read More
Previous 1 2 … 279 280 281 282 283 284 285 286 287 … 301 302 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing