Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

SEC0619-Edu2-Feat-slide1_900px

Removing the Human From the Machine Can Doom Cyber Resilience

devin sermenis
Devin Sirmenis
December 16, 2019
If your cyber risk management efforts remove key human elements from the “machine,” you might accomplish compliance but not resilience.
Read More
Spy

Why You Need TSCM Now More Than Ever

Daniil Davydoff
Daniil Davydoff
Ra Tiedemann-Nkabinde
Ra Tiedemann-Nkabinde
December 10, 2019

Our baseline level of suspicion about the security of data and communications is very high these days. Are smart devices recording conversations and conveying them to marketers?


Read More
cybersecurity breach

The Top 12 Data Breaches of 2019

Maria Henriquez
December 5, 2019
Just in 2018, there were 500 million personal records stolen. How many records will be stolen by year’s end? According to the RiskBased Data Breach QuickView Report 2019 Q3, at the end of September, there were 5,183 breaches, exposing 7.9 billion records. Compared to the 2018 Q3 report, the total number of breaches was up 33.3 percent and the total number of records exposed more than doubled, up 112 percent.
Read More
cyber laptop2

5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

mark voses
Marc S. Voses
December 5, 2019
Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.
Read More
cybersecurity-laptop

A Resilient Answer to Disasters

Ray-Rothrock
Ray Rothrock
December 5, 2019
Both disaster recovery and business continuity are answers to what happens when entropy strikes, things fall apart, and business is interrupted. Resilience is strategy using a set of tools and approaches that make it harder for things to fall apart, and easier and faster to put them back together when they do.
Read More
Malware

CISA Informs the Financial Sector on Dridex Malware

December 5, 2019
The Cybersecurity and Infrastructure Security Agency (CISA) recently published an alert on the Dridex malware, as the result of recent collaboration between the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) to identify and share information with the financial services sector.
Read More
JIKEI-Group-Partnership-for-Cybersecurity

University of West Florida and Jikei College Group Partner to Address Global Cybersecurity Workforce Shortage

December 3, 2019

The University of West Florida and the Jikei College Group in Japan announced a partnership that aims to enhance global cybersecurity workforce development.


Read More
SEC1219-talk-Feat-slide1_900px
Security Talk

Fighting Natural Disasters With AI

diane-2016-200.jpg
Diane Ritchey
December 1, 2019

Recent California wildfires have challenged enterprise security professionals who are responsible for protecting and managing emergency evacuations. How can enterprise security professionals leverage their existing security hardware and software investments to better prepare for emergencies?


Read More
data-enews

The Need for Speed

alex feick
Alexander Feick
November 27, 2019
Why are mid-sized organizations increasingly putting their hope in Managed Detection and Response providers who focus on real-time triage and investigation into data breach signals as they happen?
Read More
cyberinsurance

The Case for Automated Patch Management for SMBs

Simo Salmensuu
November 26, 2019
Though data breaches are a serious issue for large enterprise organizations, especially from a reputation perspective, the threat of compromise is a top concern for most small and midsized businesses (SMBs), too.
Read More
Previous 1 2 … 326 327 328 329 330 331 332 333 334 … 366 367 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing