Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

email security

Security risks of personal business in the workplace

Brian Parks Sanjiv Kalkar
February 2, 2021
File-sharing services, such as Google Drive, DropBox and personal OneDrive folders, also pose significant risk to the corporate network. The additional layering effect of file-sharing service — such as multiple shares of a potentially malicious file through a chain of services — create an additional layer of complexity and risk.
Read More
SEC0221-Cover-Feat-slide1_900px
Special Report

The who, what, why and how of the Baker Hughes GITSOC

Energy giant Baker Hughes built its Global Intelligence & Travel Security Operations Center from the ground up, proving its value and relevancy to the greater enterprise amidst a global pandemic.
Maggie Shein
Maggie Shein
February 1, 2021

Supporting a goal of empowering regional teams to make the most informed decisions is Baker Hughes’s Global Intelligence & Travel Security Operations Center (GITSOC). When Baker Hughes separated from GE’s oil and gas division in 2019, the event presented a unique opportunity for the Security team to create its own operating model and processes from the ground up to support the organization independently, providing the catalyst for the creation of the GITSOC. Learn about energy giant Baker Hughes’ GITSOC, as well as its value and relevancy to the greater enterprise.


Read More
us-capitol

Security practices state Capitols should put in place today

Stel Valavanis
Stel Valavanis
February 1, 2021
As lawmakers and law enforcement continue to unravel the events and impact of the crisis at the U.S. Capitol on Wednesday, January 6th, attention is turning to identification and prosecution of those that illegally entered, attacked, and looted the Capitol and the offices of the legislature housed there. We’re learning more about the litany of security failings and it is imperative that we take the lessons offered by this example and make the changes they demand now, at our state capitol buildings, as well as in our businesses.
Read More
SEC0321-Cover-Hadley-slide9_900px
Special Report

2021 Top Cybersecurity Leaders - Roy E. Hadley Jr.

Special Counsel, Adams and Reese LLP
Maria Henriquez
February 1, 2021

In addition to his role as a cybersecurity lawyer, Roy E. Hadley Jr. is well-versed in the operational and technical aspects of cybersecurity. At Adams and Reese LLP, he assists clients with response and recovery efforts in the event of an attack and assists clients with hardening their enterprises against cyberattacks.


Read More
SEC0221-career-Feat-slide1_900px
Career Intelligence

Self-employment as a career strategy

Brennan-2016-200px.jpg
Jerry J. Brennan
February 1, 2021

Barring winning a major lottery or inheritance, during a 40+ year working life in the security profession, security leaders will likely make a dozen or more job changes. While some of these may be significant responsibility shifts within a single organization, in today’s environment it is likely that a person will be changing organizations and even the type and/or responsibilities of various roles. One of those changes may include self-employment. Here’s what you need to know to ponder the transition.


Read More
SEC0221-Leadership-Feat-slide1_900px
Leadership & Management

Don’t touch that clicker! Part II

Michael Gips
Michael Gips
February 1, 2021
Lessons are best learned when we don’t expect them. That’s why television ads can have a profound impact. Though some are mindless or annoying, others are transformational and enduring, and many relate to leadership and management. The powerful lessons in leadership can be taken and used for your own inspiration.
Read More
blockchain

How two-factor authentication works with blockchain

In this article, we discuss how two-factor authentication has been evolved to address the shortcoming of single authentication systems. We also discuss how we can utilize a blockchain technology to transform 2FA by migrating the centralized network into a decentralized blockchain network. As more Internet-of-Things devices require authentication credentials and users increase their repository of usernames and passwords for accessing web services, the emergence of 2FA solutions based on blockchain technology is inevitable.
Matt Zand
Matt Zand
Rajneesh Gupta
February 1, 2021

Every organization has hundreds of applications and databases, and its employees access them every day using their credentials (that is, their username and password). An attacker with such valid credentials can bypass existing security solutions, as they look like a legitimate user. As per the Verizon Data Breach report in 2016, more than 63% of successful breaches involved compromised credentials. Two-factor authentication (2FA) provides an added layer to the existing credential-based system protection as a solution to this drastically growing problem. As such, in this article, we will cover the following two topics: What is 2FA and Blockchain for 2FA.


Read More
cyber security network

Best practices in applying MITRE ATT&CK to your organizational security

Ganesh Pai
Ganesh Pai
January 29, 2021
The cybersecurity industry has embraced MITRE ATT&CK for good reason: it provides security leaders and practitioners an objective, third-party standard with which to evaluate their own detection coverage and EDR solutions. But even while they recognize the value, many organizations are unsure about what specific steps they should take to fully benefit from MITRE ATT&CK.
Read More
american flag

The world of the 46th President

As Joe Biden takes office, Justin Crump – CEO of the global risk and intelligence consultancy Sibylline, takes stock of the challenges the new administration will face
Justin Crump
Justin Crump
January 29, 2021
As Joe Biden takes office, Justin Crump – CEO of the global risk and intelligence consultancy Sibylline, takes stock of the challenges the new administration will face and a reminder that we all need to think widely and openly about possibilities in a volatile, uncertain, complex, and ambiguous world.
Read More
cyber

Top 10 cybersecurity predictions for 2021

Pascal Geenens Daniel Smith
January 29, 2021

In the past year, COVID-19 has had a larger impact on work habits and security environments than any other health emergency in memory. That combined with technological advances such as 5G has led to several trends we expect to see in this New Year. Here then are our top ten:


Read More
Previous 1 2 … 244 245 246 247 248 249 250 251 252 … 368 369 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing