Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

vertical green binary code

72.1% of executives would like to have more data available

Security Staff
May 22, 2023

The use of consumer data was analyzed in a recent survey by Near Intelligence examining how consumer behavior data is used to make business decisions.


Read More
local business chalkboard sign

Cybersecurity for small businesses

Corey Nachreiner
Corey Nachreiner
May 22, 2023

While many SMBs mistakenly presume they’re safe from cybercriminals, low IT funding makes them a target for threat actors and future cyberattacks.


Read More
SEC_Web_5Minutes-Breen.jpg
5 Minutes With

The impact of ChatGPT and AI on the cybersecurity field

Rachelle Blair-Frasier, Editor in Chief
Rachelle Blair-Frasier
May 22, 2023

Some organizations view ChatGPT and other AI technologies as a potential cybersecurity tool others say it comes with cybersecurity risk.


Read More
multicolored text on black screen

ScanSource suffers ransomware attack

Security Staff
May 19, 2023

Hybrid distributor ScanScource announced that the company had suffered a ransomware attack and has implemented their incident response plan.


Read More
hacker-in-hoodie.jpg

How organizations can navigate an evolving fraud landscape

Rebecca Herold Headshot
Rebecca Herold
May 19, 2023

New and emerging types of technologies with insufficient-to-no security controls are being widely adopted by organizations of all types, bringing more fraud pathways.



Read More
blurry multicolor lights

12 new vulnerabilities have become associated with ransomware

Security Staff
May 18, 2023

New research identified 12 vulnerabilities newly associated with ransomware in Q1 2023, indicating increasingly complicated ransomware attacks.


Read More
red and pink shield graphic

U.S. saw 45% fewer ransomware victims posted on the dark web

Security Staff
May 18, 2023

The rise in ransomware attacks have changed how security leaders protect their organizations, including filing claims for cyber insurance.


Read More
cybersecurity-finger-pointing.jpg

Managing cyber risks while company scales

Taylor Hersom
May 18, 2023

Whether witnessing a growth in demand or investing to conquer new markets, keeping track of everything that comes with scaling can be extremely tricky.


Read More
keyboard pieces underneath key lock

Social media was 72% of non-government or financial account abuse

Security Staff
May 17, 2023

A report found identity thieves are better at using social engineering to convince people to share personal, financial and business information.


Read More
pink digital lines on black screen

32% of organizations say they're effective at mitigating cyber threats

Security Staff
May 17, 2023

A report reveals an increase in cyberattacks and evolving threat landscape are resulting in more organizations building long-term cyber resilience.


Read More
Previous 1 2 … 53 54 55 56 57 58 59 60 61 … 302 303 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing