Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

cyber-person

New York’s investigation of Dunkin Donuts results in a promise to abide by the SHIELD Act’s requirements

erik dullea
Erik Dullea
October 2, 2020
The New York Attorney General’s Office (NYAG) reached a Consent and Stipulation Agreement with Dunkin’ Brands, Inc. (Dunkin), which obligates the company to implement and maintain a comprehensive information security program to protect customers’ private information. The terms of the consent agreement are similar to the terms New York reached with Zoom earlier this year regarding inadequate data security practices, and strongly resemble the reasonable security measures described in the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act).
Read More
supply chains disrupted by COVID-19

Report illustrates severity of COVID-19 impact on global supply chains

October 2, 2020
Some industries experienced more upheaval than others. The survey found that 65% of supply chains in aerospace and defense, on average, were disrupted by the pandemic.
Read More
Small businesses don't think cyberattacks are a threat

Top targets for cybercriminals do not recognize they are at risk

October 1, 2020
Though nearly half of cyberattacks are aimed at small businesses, only 37% of small business owners reported believing they are at risk to fall victim to a cyberattack.
Read More
Ethical hackers earned $45M in 2019 and 2020

Hackers earned $45M in the last 12 months

October 1, 2020
Ethical hackers earned $44,754,742 million collectively from bug bounties in the last 12 months and reported 60,000 valid vulnerabilities.
Read More
The Cyber 101 Discussion

ESET Research uncovers APT-C-23 group’s new Android spyware masked as Threema and Telegram

October 1, 2020
ESET researchers have analyzed a new version of Android spyware used by APT-C-23, a threat group active since at least 2017 that is known for mainly targeting the Middle East. The new spyware, detected by ESET security products as Android/SpyC23.A, builds upon previously reported versions with extended espionage functionality, new stealth features and updated C&C communication.
Read More
SEC1020-Leadership-Feat-slide1_900px
Leadership & Management

We hold leaders to impossible standards. That’s good.

Michael Gips
Michael Gips
October 1, 2020

A reverend. An FBI Director. A Fortune 1000 CEO. A British Prime Minister. Four individuals representing widely different aspects of life: spirituality, law and order, business, politics.


Read More
SEC1020-career-Feat-slide1_900px
Career Intelligence

How to avoid working for a terrible security leader

Brennan-2016-200px.jpg
Jerry J. Brennan
October 1, 2020

During your security career, it is highly likely at some point that you will come across someone in a leadership role whose personality and style characteristics create an environment that is toxic and stressful. If you are in the unfortunate position of working for that individual while you are seeking new career opportunities, it may be time to reflect on any early warning indicators you may have missed.


Read More
SEC1020-Cover-Feat-slide1_900px

Corning takes unified approach to pandemic response

A tightly coordinated pandemic response effort from Corning’s global security group enabled the company to continue business operations while protecting its employees, locations and communities.
Maggie Shein
Maggie Shein
October 1, 2020

A tightly coordinated pandemic response effort from Corning’s global security group enabled the company to continue business operations while protecting its employees, locations and communities.


Read More
Arizona county mandates quarantine for any worker leaving for work to a high-risk area amid COVID-19

County in Ariz. requires employees that travel to high-risk areas to quarantine for two weeks upon arrival home

September 30, 2020
Employees in Pima County, Arizona who travel to any high-risk COVID-19 area will not be permitted to return to work for 14 consecutive days after returning home.
Read More
A new report from DTEX Systems shows this year’s shift to a largely remote workforce by the Global 5000 has significantly changed behaviors of trusted insiders.

More than half of companies discover employees intentionally masking online activities according to report

September 30, 2020
A new report shows this year’s shift to a largely remote workforce by the Global 5000 has significantly changed behaviors of employees and trusted insiders.
Read More
Previous 1 2 … 281 282 283 284 285 286 287 288 289 … 366 367 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing