Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

hacker

How can companies keep up with social engineering attacks?

Gary Orenstein[1].jpg
Gary Orenstein
September 6, 2022

Social engineering exploits human interactions to gain personal information and login credentials. Enterprises can protect networks from these cyberattacks.


Read More
Finland Parliament

After cyberattacks, Finland to award companies cybersecurity grants

Madeline Lauver
September 6, 2022

After a cyberattack on the Parliament of Finland, the country will provide cybersecurity funding to businesses to improve cyber defense programs.



Read More
train

MBTA founds compliance office to address transit safety concerns

Security Staff
September 6, 2022

The Federal Transit Administration (FTA) has required the MBTA to conduct 53 corrective actions in response to safety concerns. The Quality, Compliance and Oversight Office will help improve safety at the MBTA.




Read More
man on elephant
Cyber Tactics

Flaming torches and cybersecurity

Being a security leader while juggling business priorities and daily operations is a challenge that requires pragmatic solutions.
John McClurg
John McClurg
September 6, 2022

For CISOs, particularly those at a small or medium-sized business (SMB), juggling security and business priorities and operational exigencies require pragmatic solutions.


Read More
person-sitting
Security Talk

Designing schools with mental health in mind

Safety and security stakeholders can empower students and staff to help mitigate mental health issues, violence or unwanted behaviors by starting with facility design.
Maggie Shein
Maggie Shein
September 6, 2022

Safety and security stakeholders can empower students and staff to help mitigate mental health issues, violence or unwanted behaviors by starting with facility design. 


Read More
software developer

Software supply chain security guidance for developers

Security Staff
September 2, 2022

The Cybersecurity and Infrastructure Security Agency (CISA) and federal intelligence agencies have released guidance titled Securing the Software Supply Chain for Developers.


Read More
handshake

Faith Roy named Deputy CISO at US Department of Veterans Affairs

Security Staff
September 2, 2022

Faith Roy has been named Deputy Chief Information Security Officer (CISO) at the U.S. Department of Veterans Affairs.


Read More
hurricane-public-safety-unsplash1170.jpg

How public safety can prepare for severe weather

Todd Miller
Todd Miller
September 2, 2022

It’s a good time for public safety, emergency management, and law enforcement officials to revisit severe weather plans. Here are 3 foolproof ways to ensure emergency preparedness.


Read More
hotel room

3 ways to implement weapons detection technology for better hotel security

SEC0821-K12-Broad-slide2_900px
Peter Evans
September 2, 2022

Here are 3 ways security leaders can implement modern security technology and processes to ensure hotel safety and security, risk management and overall security operations success.


Read More
security-risk_assessment-fp1170x658v4pf.jpg

Risk assessments in focus amid security challenges

In the face of evolving risks, it’s time to reassess your security operation’s everyday hazards.
Mike Zblewski
September 2, 2022
Given today’s security challenges, a thorough risk assessment review is probably overdue. Here are 5 easy ways to update risk assessments now.



Read More
Previous 1 2 … 78 79 80 81 82 83 84 85 86 … 368 369 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing