Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

digitalization

How Cybersecurity Can Best Support the Digital Enterprise

As companies digitize businesses and automate operations, cyber risks proliferate; here is how the cybersecurity organization can support a secure digital agenda.
James M. Kaplan
James M. Kaplan
Wolf Richter
Wolf Richter Dr.
David Ware
David Ware
August 1, 2019

Two consistent and related themes in enterprise technology have emerged in recent years, both involving rapid and dramatic change. One is the rise of the digital enterprise across sectors and internationally. The second is the need for IT to react quickly and aggressively develop innovations to meet the enterprise’s digital aspirations.


Read More
cyber-enews

What to Consider When Developing a Cybersecurity Strategy

Wayne Dorris
Wayne Dorris
July 30, 2019
In a world where devices of all types are connected to networks, the need to maintain strong cybersecurity is greater than ever. For organizations, particularly those that retain financial and other sensitive company and customer data, cybersecurity is critical, as the results of a network breach could be catastrophic.
Read More
workplace-enews

Top Benefits of Using Technology to Better Manage Security Workforces

MarkFolmer
Mark Folmer
July 30, 2019
Security organizations may be late adopters of technology to manage their workforces, but once implemented, the early benefits of technological solutions become quite clear to them. They’re waking up to understand that simply placing a security officer at a post is no longer a viable option.
Read More
Increase in Cybercrime Demands Fresh Attention to Employee Onboarding and Training

When It Comes to Employee Security Awareness Training - Should You be Phishing or Teaching?

mike polatsek
Mike Polatsek
July 26, 2019

When it comes to employee awareness training, many organizations opt for phishing testing to gauge the state of their employee awareness


Read More
"Security:" What’s in a Word?

Why Sensitivity Training is De Rigueur for Today’s Security Professionals

geoff craighead
Geoff Craighead
July 25, 2019

Should sensitivity training be required for today’s security professionals?


Read More
Security Worker

New Information Security Forum Report Explores How to Build an Effective SOC

July 16, 2019

A new report from the Information Security Forum (ISF) explores the key elements that are integral to optimizing a SOC’s performance, realizing operational efficiency and pursuing innovation, and equips organizations with a practical understanding of how to design, establish and enhance a SOC that is both empowered by the organization, and aligned with business requirements.


Read More
Ebola

Aid Under Attack: What the DRC’s Ebola Crisis Teaches Us About Security and Local Perceptions

J. Mathew Mayes
J. Mathew Mayes
Daniil Davydoff
Daniil Davydoff
July 9, 2019

Despite the availability of an experimental vaccine and the recent experience of a major Ebola outbreak in West Africa, the Democratic Republic of the Congo (DRC) is failing to address what is now the world’s second-largest outbreak of the disease.


Read More
global

What is New (and What Isn’t) in Business Continuity Planning Pt.2

Kevin Alvero
Kevin Alvero
Wade Cassels
Wade Cassels
July 2, 2019
According to the Disaster Recovery Institute (DRI), the actual scope of work of a BC or resilience professional hasn’t really changed. Organizations still must have high-quality response and damage limitation plans formulated by skilled planners. The change in the resilience profession, however, is moving away from a technical specialization and into mainstream business risk management. DRI reports that consolidation of resilience disciplines has increased over the past year. The main result of this is that fewer organizations have independent business continuity departments, with BC professionals being incorporated into existing risk management or information security divisions.
Read More

Federal Agencies’ Cybersecurity Failures Leaving Americans’ Personal Information at Risk

June 26, 2019

U.S. Senators Rob Portman (R-OH) and Tom Carper (D-DE) published a report that documents the failure of eight federal agencies, over the course of two administrations, to address vulnerabilities in their IT infrastructure.


Read More
inge huijbrechts

Leading at the Crossroads of Sustainability and Security Risk: A Discussion with Inge Huijbrechts

Daniil Davydoff
Daniil Davydoff
June 18, 2019

If there is any broad lesson we have learned over the past decade of global developments, it is the extent to which risks are connected and the shocks that can result if we do not acknowledge their linkages


Read More
Previous 1 2 … 332 333 334 335 336 337 338 339 340 … 366 367 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing