Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Logical Security

Logical Security
Logical Security RSS Feed RSS

Holden
Special Report

Alex Holden - Top Cybersecurity Leaders 2023

Founder and Chief Information Security Officer, Hold Security
Madeline Lauver
March 1, 2023

Alex Holden uses actionable threat intelligence to identify some of the world’s largest data breaches and unearth ransomware collective operations.


Read More
Hanson
Special Report

Jadee Hanson - Top Cybersecurity Leaders 2023

Chief Information Officer & Chief Information Security Officer, Code42
Laura Stepanek
March 1, 2023

Jadee Hanson, CIO and CISO at Code42, takes a human-centric approach to insider risk management and cybersecurity best practices.


Read More
Edgar
Special Report

James Edgar - Top Cybersecurity Leaders 2023

Senior Vice President and Chief Information Security Officer (CISO), FLEETCOR
Madeline Lauver
March 1, 2023

James Edgar, SVP and CISO at FLEETCOR, has matured cybersecurity programs by foregrounding compliance and instilling a culture of security across organizations.


Read More
global map with code over it and the word hacked in red letters

26.6 million login credentials obtained by cybercriminals since 2018

Security Staff
February 28, 2023

Since 2018, five million people globally had data stolen. A study found that 26.6 million usernames and passwords were obtained by cybercriminals.


Read More
men in suits checking phones while waiting for public transportation

Research predicts major cybersecurity workforce shifts in coming years

Security Staff
February 24, 2023

Analysts have predicted major cybersecurity workforce shifts. According to research, nearly half of cybersecurity leaders will change jobs by 2025.


Read More
shipping vessel in open water

Fishing vessel cited for electrical hazards and poor sanitation

Security Staff
February 23, 2023

An Alaskan fishing vessel has been cited again by OSHA for improper sanitation, hazardous food and water storage and electrical hazards. 


Read More
man sitting at home office setup

NSA best home network practices

Security Staff
February 23, 2023

The NSA released a list of cybersecurity best practices designed to help teleworkers protect their home networks from malicious cyber actors.


Read More
half open laptop in dark room

Feigning sickness is the most common romance scammer tactic

Security Staff
February 21, 2023

The FTC released data regarding the common lies sold by romance scammers, whose scams cost nearly 70,000 consumers $1.3 billion in 2022.


Read More
multicolored html text on computer screen

Organizations fought an average of 29.3 attacks daily in late 2022

Security Staff
February 15, 2023

2022 Radware threat analysis report defined DDoS attack profiles by gains in number, frequency, volume, power, duration and complexity.


Read More
gold computer chip

It's time to prepare for quantum computing’s impact on DNS security

Peter Lowe
February 14, 2023

When quantum computing makes its entrance, it could eviscerate online communications. Cybersecurity efforts to prevent quantum attacks can’t wait.


Read More
Previous 1 2 … 66 67 68 69 70 71 72 73 74 … 300 301 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Code

Security Leaders Discuss the Marquis Data Breach

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing