This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

coronavirus

Keeping Unoccupied Stores Safe from Burglaries or Looting in the Time of the Coronavirus

Stevealbrecht
Dr. Steve Albrecht
March 31, 2020
Because of the COVID-19 virus pandemic, millions of Americans have been asked to stay in their houses until further notice. Our new national focus on hygiene and hibernation means that we’re mostly home, save for only necessary trips to the grocery store, the pharmacy, or for medical appointments. While it’s hard to define being quarantined as a good thing, from a security perspective, it means the chances of experiencing a home burglary are now quite low.
Read More
coronavirus

Will COVID-19 Change Everything? The Case for Being Skeptical

Dan davydoff   pic1
Daniil Davydoff
March 31, 2020

Chances are that the novel coronavirus and the resulting disease—COVID-19—has upended your world.


Read More
SEC0319-Cyber-Feat-slide1_900px

How Artificial Intelligence is Going to Make Your Analytics Better Than Ever

Aaron saks
Aaron Saks
March 31, 2020

Artificial intelligence (AI) presents a perfect solution to compensate for unmanned environments or those with limited staffing, or the loss of vigilance after looking at a screen too long. AI can help us not only watch continuously, but also feed systems that are able to sort, organize and categorize massive amounts of data in a way that human operators cannot. And it can do so far more reliably than traditional video analytics ever did.


Read More
Virus Detected

Employee Training is Key in Preventing Breaches, But is it Enough?

Filip truta
Filip Truta
March 31, 2020
Is it truly possible to train every single employee—including those working from home and organizations’ third-party partners—to spot a cyber-threat? Or to keep good cybersecurity hygiene when handling sensitive data? Or to refrain from stealing intellectual property when they’re disgruntled and about to resign? While training is a key element to preventing breaches and protecting important corporate data, training alone is not enough.
Read More
Top 3 Misconceptions About Data After Death - Security Magazine

How to Personalize Customer Experiences at Scale while Guaranteeing Privacy

Aaron Glazer
March 30, 2020

CMOs are now tasked with introducing privacy-centric practices to protect consumer data, while simultaneously using this data to personalize experiences. Here are three ways privacy will need to evolve organization-wide as demand for personalized "everything" grows. 


Read More
SEC0719-Privacy-Feat-slide1_900px

The Case for a Federal Digital Privacy Strike Force

Stuart N. Brotman
March 27, 2020
In late January, the Department of Justice filed lawsuits seeking temporary restraining orders against five companies and three individuals, based on allegations that they had carried hundreds of millions of fraudulent robocalls to American consumers. Within days, the Federal Trade Commission (FTC) sent letters to 19 Voice over Internet Protocol providers to warn them that any assistance or facilitation of telemarketing through robocalls would be deemed to violate the new law.
Read More
SEC1118-talk-Feat-slide1_900px

The Top 10 Employer Cybersecurity Concerns For Employees Regarding Remote Work

Gul saad final headshot
Saad Gul
Slipsky mike final headshot
Mike Slipsky
March 26, 2020

While increasingly common even before the coronavirus, remote work brings its own unique set of cybersecurity challenges. Here are the ten most common pitfalls and the recommended solutions.


Read More
SEC0320-edu-feat-slide1_900px

Health, Wellness and Physical Fitness and Your Security Officers

Are Your Security Officers Fit for Duty?
Andy Tufano
March 25, 2020

It may well be that the primary reason that security officers have historically struggled to achieve high levels of organizational and vocational relevance and performance is based solely on their generalized lack of health, wellness and physical fitness.


Read More
coronavirus

Simple Security Steps for Employees and Employers – Establishing Secure and Flexible Remote Work Environments

Carmen fontana
Carmen Fontana
March 25, 2020
As companies find themselves suddenly shifting to remote work due to the COVID-19 (coronavirus) outbreak, many employees are working from home for the first time. While not ideal from a security standpoint, there are simple steps you, and your employer, can quickly take to better secure your new working environment.
Read More
SEC0219-pen-Feat-slide1_900px

11 Types of Spoofing Attacks Every Security Professional Should Know About

David balaban
David Balaban
March 24, 2020

The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.


Read More
Previous 1 2 … 268 269 270 271 272 273 274 275 276 … 321 322 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

2023 Top cyber security leaders

Security's 2023 Top Cybersecurity Leaders

CT scanner

Cybersecurity threats to medical devices are a growing concern

Empty conference room

Cyber risk is a business risk

laptop phone.jpg

31% of organizations had users fall for phishing attack

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing