Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

communication-freepik943t6.jpg

The hidden threat of business collaboration tools

Your organization risks compliance and disaster protection shortcomings unless your data management practices catch up with the evolution of information sharing.
Ajay Bhatia
October 4, 2021

Your organization risks compliance and disaster protection shortcomings unless your data management practices catch up with the evolution of information sharing.


Read More
Feature-image-security
Special Report – Critical Infrastructure

A resilience framework for the future

Mitigate the consequences of risks and disruptions that materialize by making disaster resilience a priority in security programs.
Daniel Kaniewski
Daniel Kaniewski
October 4, 2021

By making resilience a priority for an organization, business leaders can reduce disruptions and lessen the consequences from risks that may materialize. To build a framework for the future, considerations must include preparedness, hazard mitigation, insurance and resilience in the context of emerging risks.


Read More
October2.png

October marks Cybersecurity Awareness Month

Security experts comment on where efforts should be focused
Maria Henriquez
October 1, 2021

National Cybersecurity Awareness Month (NCSAM) is now in its 18th year. The theme for 2021 is ‘Do Your Part. #BeCyberSmart,’ helping to empower individuals and organizations to own their role in protecting their part of cyberspace.


Read More
9_11-unplash.jpg

How the 9/11 terrorist attacks shifted the global security landscape

James-Wood-Headshot.jpg
James Wood
October 1, 2021

9/11 had a transformative effect on security risk management, just as COVID-19 has on healthcare. The risk of terrorism had come directly into business operations, impacting employees as it never had before. Duty of care came to the fore with regards to security risks, both from a legislation perspective and the growing responsibility for corporates. 


Read More
hacker-freepik

Thinking like a hacker: Protect your company from cyberattacks

Matt Hodson
Matthew Hodson
October 1, 2021

How long does a cybercriminal’s timeline usually take? What are their moves? And what tools do they usually employ? To answer these questions, it helps to think like a hacker.


Read More
remote work

How to address data privacy risks created by remote and hybrid work

Jessica Walton
October 1, 2021

The challenge companies now face is how they can maintain control over the security and privacy of their information, especially as they look to make remote and hybrid work permanent options after employees return to the workplace.


Read More
Person sits at desktop computer with code

Over half of business owners admit to concealing a data breach

September 30, 2021

A new survey shows the cybersecurity priorities and worries of IT business executives. Top of mind issues include a lack of faith in governmental cyber intervention and reputational concerns due to data breaches.


Read More
Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

Why automation, artificial intelligence and machine learning are becoming increasingly critical for SOC operations

daniel-clayton.jpg
Daniel Clayton
September 30, 2021

The path to success requires artificial intelligence and machine learning to supercharge the expertise and experience of an equally innovative and warm-bodied defender working as part of an enterprise security operations center and outsourced services like managed detection and response.


Read More
Woman looks at computer

Cybercrime hurts some population groups more than others

Madeline Lauver
September 30, 2021

A new survey of 5,000 internet users around the globe reveals disparities between demographic groups when it comes to internet safety and privacy. 


Read More
Boardroom

Sara Avery hired as CRO at Cenlar

September 29, 2021

The experienced Chief Risk Officer Sara Avery has held many leadership roles across the risk management field.


Read More
Previous 1 2 … 188 189 190 191 192 193 194 195 196 … 367 368 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

An Opened Lock Standing Out From Locked Locks

From the Outside In: A Smarter Approach to Vendor Access

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing