Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security & Business Resilience

Security & Business Resilience
Security & Business Resilience RSS Feed RSS

supply chains disrupted by COVID-19

Report illustrates severity of COVID-19 impact on global supply chains

October 2, 2020
Some industries experienced more upheaval than others. The survey found that 65% of supply chains in aerospace and defense, on average, were disrupted by the pandemic.
Read More
Small businesses don't think cyberattacks are a threat

Top targets for cybercriminals do not recognize they are at risk

October 1, 2020
Though nearly half of cyberattacks are aimed at small businesses, only 37% of small business owners reported believing they are at risk to fall victim to a cyberattack.
Read More
Ethical hackers earned $45M in 2019 and 2020

Hackers earned $45M in the last 12 months

October 1, 2020
Ethical hackers earned $44,754,742 million collectively from bug bounties in the last 12 months and reported 60,000 valid vulnerabilities.
Read More
The Cyber 101 Discussion

ESET Research uncovers APT-C-23 group’s new Android spyware masked as Threema and Telegram

October 1, 2020
ESET researchers have analyzed a new version of Android spyware used by APT-C-23, a threat group active since at least 2017 that is known for mainly targeting the Middle East. The new spyware, detected by ESET security products as Android/SpyC23.A, builds upon previously reported versions with extended espionage functionality, new stealth features and updated C&C communication.
Read More
SEC1020-Leadership-Feat-slide1_900px
Leadership & Management

We hold leaders to impossible standards. That’s good.

Michael Gips
Michael Gips
October 1, 2020

A reverend. An FBI Director. A Fortune 1000 CEO. A British Prime Minister. Four individuals representing widely different aspects of life: spirituality, law and order, business, politics.


Read More
SEC1020-career-Feat-slide1_900px
Career Intelligence

How to avoid working for a terrible security leader

Brennan-2016-200px.jpg
Jerry J. Brennan
October 1, 2020

During your security career, it is highly likely at some point that you will come across someone in a leadership role whose personality and style characteristics create an environment that is toxic and stressful. If you are in the unfortunate position of working for that individual while you are seeking new career opportunities, it may be time to reflect on any early warning indicators you may have missed.


Read More
SEC1020-Cover-Feat-slide1_900px

Corning takes unified approach to pandemic response

A tightly coordinated pandemic response effort from Corning’s global security group enabled the company to continue business operations while protecting its employees, locations and communities.
Maggie Shein
Maggie Shein
October 1, 2020

A tightly coordinated pandemic response effort from Corning’s global security group enabled the company to continue business operations while protecting its employees, locations and communities.


Read More
Arizona county mandates quarantine for any worker leaving for work to a high-risk area amid COVID-19

County in Ariz. requires employees that travel to high-risk areas to quarantine for two weeks upon arrival home

September 30, 2020
Employees in Pima County, Arizona who travel to any high-risk COVID-19 area will not be permitted to return to work for 14 consecutive days after returning home.
Read More
A new report from DTEX Systems shows this year’s shift to a largely remote workforce by the Global 5000 has significantly changed behaviors of trusted insiders.

More than half of companies discover employees intentionally masking online activities according to report

September 30, 2020
A new report shows this year’s shift to a largely remote workforce by the Global 5000 has significantly changed behaviors of employees and trusted insiders.
Read More
ransomware

Guard against ransomware and business disruption with offline backups

Laura Loreda
Laura Loredo
Diane Salazar
Diana Salazar
Carlos Sandoval
Carlos Sandoval
September 30, 2020
Corporate enterprises and governments used to be the main targets of cyberattacks, but now any organization with an online presence is vulnerable. The surge in remote working due to the pandemic significantly increases risk as IT departments balance the demands of security, remote access and business continuity. Widespread use of new apps and solutions, credential sharing, unsecured Wi-Fi, weak passwords, lack of encryption and more provide cybercriminals with many opportunities to exploit gaps in security.  
Read More
Previous 1 2 … 283 284 285 286 287 288 289 290 291 … 368 369 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing