Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

multicolored lights

Financial sector has highest password reuse rate

Security Staff
May 15, 2023

Employee exposure was measured in a report that observed a 62% password reuse rate among Fortune 1000 employees who have been exposed more than once. 


Read More
Spreadsheet.jpg

Manual processes dominate TPRM as security incidents increase

Security Staff
May 12, 2023

A new study shows 48% of companies still depend on spreadsheets, while 41% report experiencing an impactful third-party breach in the last year.


Read More
people working at conference table

Top 3 ways to boost employee safety

Sara Pratley
May 12, 2023

From severe weather to workplace violence and civil unrest to an uncertain economy, employees are taking note of today’s increasingly dangerous world.


Read More
empty school desks

Managing false threats to schools to prepare for real emergencies

David Rogers
May 12, 2023

As school districts grapple with the threat of mass shootings, they are also dealing with a record number of false active shooter reports in U.S.


Read More
security officer in yellow vest

How to mitigate the risk of a physical security breach

Taelor Sutherland, Associate Editor
Taelor Sutherland
May 12, 2023
Security leaders should create risk management plans to ensure property remains protected and their employees feel safe within the workplace. 


Read More
storm clouds

IRS provides guidelines to protect information during severe weather

Security Staff
May 11, 2023

The IRS has released recommendations on how to protect sensitive documents from getting damaged or stolen in the event of severe weather.


Read More
Cybersecurity-lock.jpg

47% of all internet traffic came from bots in 2022

Security Staff
May 11, 2023

A new report reveals that in 2022, 47.4% of all internet traffic came from bots, a 5.1% increase over the previous year.


Read More
laptop open on desk

69% of IT professionals have adopted SLOs for the first time

Security Staff
May 11, 2023

A recent survey indicates a focus on system reliability due to the pandemic driving cloud adoption, remote workers and supply chain issues. 


Read More
Women in security working
Security Strategy

Data-driven decisions in the SOC

Security leaders can use data-driven decision-making to identify inefficiencies, quantitatively measure the success of security procedures and encourage collaboration between teams.
Simon Morgan
May 11, 2023

Data-driven decision-making is a key factor in making informed business and management decisions and is prevalent today in many types of settings.


Read More
technology with blue lighting

77% of organizations plan to migrate to updated frameworks

Security Staff
May 10, 2023

A report looks at the changes compliance, detailing how security leaders address compliance investments, framework updates, tooling and automation.


Read More
Previous 1 2 … 53 54 55 56 57 58 59 60 61 … 300 301 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Code

Security Leaders Discuss the Marquis Data Breach

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing