Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
Security Enterprise Services RSS Feed RSS

Gas Refinery

Video surveillance secures Welsh natural gas facility

October 15, 2021
A hybrid security solution of IP and analog surveillance cameras helps to keep the Dragon Liquid Natural Gas facility in Wales, U.K. secure.
Read More
critical-infrastructure-freepik

Shoring up cybersecurity in critical infrastructure and the nation's defense supply chain

Ryan Moody
October 15, 2021

A recent surge in cyberattacks, including SolarWinds and Colonial Pipeline, has intensified a focus on cybersecurity across industrial sectors and critical infrastructure. As a result, the U.S. government and other organizations within the nation’s defense supply chain have taken action to protect the critical assets and organizations that ensure the security and prosperity of our country. 


Read More
server room, cybersecurity, penetration testing,

Pentesting vs. threat hunting: What’s the difference?

Michelle Drolet
October 15, 2021

Like many other security processes, penetration testing and threat hunting are often incorrectly equated. However, the difference between the two is that between prevention and detection. 


Read More
education-training
Education & Training

Cybersecurity lessons learned in the K-12 sector

Mary Jane Warden
maria-s
Maria Stavropoulos
October 15, 2021
Two school district technology leaders share their first-hand experiences and insights into the cybersecurity vulnerabilities affecting the K-12 sector, along with how to design a security roadmap and the challenges that come along with implementing one.
Read More
product-spotlight
Product Spotlight

Product spotlight on mass notification solutions

Here is a sampling of the latest mass notification solutions.
Maria Henriquez
October 15, 2021

In emergencies such as a natural disaster, industrial accident, IT service disruptions or facility intrusion, delivering important messages with real-time speed while collecting situational feedback can save lives and keep critical business operations running. Enter mass notification technology. Here, we explore a sampling of the latest mass notification solutions.


Read More
Software engineers at computer with code

Software engineers and developers among most in-demand cybersecurity roles

October 14, 2021

A new report from Veriff analyzes data about the cybersecurity workforce, finding strong cybersecurity industries in the United States, Brazil and Mexico. The report also details which jobs are the most in-demand, having researched global job boards and roles at cybersecurity companies.


Read More
Boardroom

The critical role of a CISO means advocating for cybersecurity

Madeline Lauver
October 14, 2021

At the Raines Cybersecurity Leadership webinar, cyber expert Elad Yoran discussed the essential traits of a CISO and why businesses should incorporate a security voice in their boardroom.


Read More
supply-chain-freepik

Supply chain cybersecurity trends: What professionals should be aware of and how to prepare for 2022

Mark Jones
October 14, 2021

Throughout the past two years, supply chain professionals have experienced the national and international disruptions that can occur as a result of cyberattacks, with some threats completely halting certain sectors. 


Read More
smartphone-app-development-freepik.jpg

Why mobile app developers need to prioritize user data privacy and security — and what they can do to ensure it

Sam Rehman
Sam Rehman
Boris Khazin
Boris Khazin
October 13, 2021

While offering incredible conveniences, mobile apps are also a vehicle for malicious hackers to obtain sensitive data and personal information. But before we dive into the work of hackers, it is important to understand user privacy.


Read More
hacking freepik

Why hack back is still wack: 5 causes for concern

Jen Ellis
October 13, 2021

While the appeal of taking action against an attacker is easy to see, private sector hack back is a very bad idea. We encourage organizations to employ active defense techniques, but limit these to assets you own or operate. Hack back raises a number of concerns, as detailed here..


Read More
Previous 1 2 … 127 128 129 130 131 132 133 134 135 … 367 368 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing