This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

videoscreen-enews

Look to the Cloud for Small Business Security

Hosted video surveillance services can be the perfect fit for small businesses.
al-buhaisi
Hamdan Al-Buhaisi
December 23, 2019

If there’s one thing most small business owners have in common, it’s being pressed for time. Managing so many areas of responsibility leaves small businesses with little time to dedicate to any one task. Important decisions – like investments in security – demand time and attention but must also be weighed against what’s realistic for your organization to maintain within its current resource level. Hosted video surveillance services, for example, can provide small businesses with reliable video monitoring but with less maintenance than traditional security deployments, and less upfront cost.  


Read More
cyberinsurance

Just Paid the Ransom? Here’s How to Prevent It From Happening Again

Richard Langston
December 23, 2019
Hackers can be relentless with their cyberattacks. While organizations can be vulnerable to many security threats, ransomware is especially ruthless since its attacks are completely automated. It doesn’t matter what industry or business you are in – hackers don’t care if your organization has “nothing of value,” their machines will try to attack anything that is vulnerable.
Read More
cloud-enews

4 Cloud Facts You Might Not Know

martin renkis
Martin Renkis
December 23, 2019
Cloud-based solutions have grown exponentially in the past 10 years, offering secure, simple and cost-effective benefits – so why aren’t more users taking advantage of them? Simply put, people are skeptical of what they don’t fully understand, and when it comes to cloud solutions, there are many questions regarding the migration process.
Read More
SEC0919-Edu2-Feat-slide1_900px

Why the CDN Market Is Poised to Explode Over the Next 5 Years

Igor Debatur
December 19, 2019
With the CDN market expected to reach $25B by 2025, the entire concept of a Content Delivery Network is evolving as AI and machine learning technologies continue to improve.
Read More
SEC1018-note-Feat-slide1_900px

Protecting Your Global Workforce With Modern Threat Monitoring Systems

Brett Andrew
December 18, 2019
How can you protect your organization and employees with a fully integrated threat monitoring system and help fulfill your duty of care obligations and keep your employees safe?
Read More
digital workplace

7 Essential Security Factors to Consider When Choosing Your Enterprise’s Messaging Platform

Messaging platforms are changing the way information is shared in the workplace. But that shouldn’t come at the risk of data breaches.
Praveen Kanyadi
December 17, 2019
What are some of the main security factors to consider when using enterprise messaging platforms?
Read More
SEC0619-Edu2-Feat-slide1_900px

Removing the Human From the Machine Can Doom Cyber Resilience

devin sermenis
Devin Sirmenis
December 16, 2019
If your cyber risk management efforts remove key human elements from the “machine,” you might accomplish compliance but not resilience.
Read More
Spy

Why You Need TSCM Now More Than Ever

Daniil Davydoff
Daniil Davydoff
Ra Tiedemann-Nkabinde
Ra Tiedemann-Nkabinde
December 10, 2019

Our baseline level of suspicion about the security of data and communications is very high these days. Are smart devices recording conversations and conveying them to marketers?


Read More
cybersecurity breach

The Top 12 Data Breaches of 2019

Maria Henriquez
December 5, 2019
Just in 2018, there were 500 million personal records stolen. How many records will be stolen by year’s end? According to the RiskBased Data Breach QuickView Report 2019 Q3, at the end of September, there were 5,183 breaches, exposing 7.9 billion records. Compared to the 2018 Q3 report, the total number of breaches was up 33.3 percent and the total number of records exposed more than doubled, up 112 percent.
Read More
cyber laptop2

5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

mark voses
Marc S. Voses
December 5, 2019
Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.
Read More
Previous 1 2 … 285 286 287 288 289 290 291 292 293 … 326 327 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

  • clouds in sky
    Sponsored byMilestone Systems

    Smaller School Districts are Facing Infrastructure Growing Pains

Popular Stories

Cybersecurity-lock.jpg

47% of all internet traffic came from bots in 2022

multicolored text on black screen

ScanSource suffers ransomware attack

computer controls

Four testing priorities for stronger API security

multicolor text on black screen

Ransomware is being excluded from cyber insurance policies

SEC_Web_5Minutes-Breen.jpg

The impact of ChatGPT and AI on the cybersecurity field

7/18 Webinar Resolver

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 21, 2023

Scene Intelligence: Reducing Time Between Incident and Response

Video analytics has come a long way in the past two years. Improvements to edge-based data algorithms have helped companies like Public Storage reduce the number of false alarms and protect properties better than ever before.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
May 2023 Webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing