Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

Man on laptop at airport

Hackers Don’t Take PTO: Why Travel Season Is Prime Time for Cyberattacks

Johnson headshot
Brent Johnson
August 14, 2025

When vacationers unwind and employees unplug, cybercriminals clock in for their busiest time of year.


Read More
Power lines

Iran’s Cyber Playbook: What US Critical Infrastructure Needs to Be Doing Right Now

Malarkey headshot
Matt Malarkey
August 5, 2025

For security leaders across U.S. critical national infrastructure, the question isn’t if they’re in the crosshairs. It’s how ready they are when, not if, the next attack hits.


Read More
Crypto symbols

DevOps Missteps Fuel Crypto-Mining: Why Infrastructure Observability is a Security Imperative

Crandall headshot
Carolyn Crandall
July 31, 2025

Cryptojacking is often treated as a nuisance-level threat, but recent campaigns have exposed a far more systemic issue.


Read More
Smart watch security

Securing the Digital Frontier: Strategies for Safeguarding Companies and Customers in the Age of Wearables

Adapting frameworks to encompass emerging risks associated with the latest wearable trends is essential.
Pam Nigro headshot
Pam Nigro
July 31, 2025

Adapting frameworks to encompass emerging risks associated with the latest wearable trends is essential.


Read More
Figurines at desks

How to Take on the Insider Threat to Cybersecurity

Scinta headshot
Gina Scinta
July 29, 2025

Cybersecurity risks from insider threats are only going to become more commonplace and more expensive. By knowing the types of insider threats and how industry solutions can reduce their risk, organizations will be better equipped to weather the next attack.


Read More
Orange and white cards

Proximity Cards Are a Liability: The Urgent Need to Modernize Access Control

Cottingham headshot
David Cottingham
July 22, 2025

Proximity cards have been a fixture in physical access control systems for decades. But today, they are one of the weakest links in enterprise authentication. 


Read More
Red and black technological patterns

Why SASE Should Be As Flexible as the Organization

Young headshot
Andrew Young
July 16, 2025

SASE itself isn’t a catch-all. There are different types of SASE, and the differences between them can make or break whether or not they’re the right fit for your organization. 


Read More
Recovery in neon green

Think You Can’t Afford Recovery and Remediation? Think Again. You Have Everything to Lose

Millington headshot
Chris Millington
July 15, 2025

Businesses that can’t recover rapidly and control their losses could be lost forever.


Read More
Investment spelled with blocks

Reframing ROI in Cybersecurity: From Cost Center to Business Enabler

Hurley headshot
John Hurley
July 15, 2025

As cyber budgets expand and boards demand clearer justification for security spend, CISOs and cybersecurity leaders must rethink how they define and demonstrate return on investment (ROI). 


Read More
Cracked digital screen

How to Prevent “Smash & Grab” Cyberattacks

T.J. Ramsey headshot
T.J. Ramsey
July 10, 2025

The best way to prevent smash & grab cyberattacks is to safeguard shared drives and implement MFA protection in a timely manner.


Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 … 303 304 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing