Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
Security Enterprise Services RSS Feed RSS

Tiktok

Banning TikTok and Chinese apps is a national security red herring

Marcus Fowler
Marcus Fowler
October 16, 2020
Much like the long-standing debate around 5G, President Trump’s recent decision to sign an executive order that may see TikTok and WeChat banned, and has now evolved into a bidding war for TikTok’s U.S. operations with Oracle leading as the potential winner, has brought the world’s attention to the inherent security challenges that complex global digital communications and connectivity present.
Read More
SEC0319-Cyber-Feat-slide1_900px

Are you ready for AI engineering within EU data regulations?

Dr. Rodrigue Talla Kuate
Dr. Rodrigue Talla Kuate
October 16, 2020
To better regulate the use of personal data and protect citizens, the European Union adopted the General Data Protection Regulation (GDPR), which came into force on 25 May 2018. In the UK, the GDPR is tailored by the Data Protection Act 2018. Non-EU businesses with offices in Europe, or who hold or process data coming from Europe, also need to be fully appraised of GDPR. The digital revolution has made it easier for companies to collect insights on their markets to better understand their clientele's behavior. But it has also paved the way for potential abuses, creating a climate of suspicion. How can AI earn the public’s trust?
Read More
computer

WFH? Digital security during a pandemic

harding bush
Harding Bush
October 15, 2020
Criminals are leveraging elevated interest in COVID-19 to send emails to unsuspecting people to infect computers with ransomware, malware or other computer viruses. And why not? According to Forbes, the COVID-19 crisis has turned the U.S. workforce into a work-from-home army, giving cybercriminals new, less secure, access points for cyber viruses and phishing attacks, revealing vulnerabilities in cybersecurity strategies for the coronavirus crisis. And since there’s a tremendous curiosity for coronavirus information — people are more likely to click without checking the credibility of the source.
Read More
5 mins with julian waits

5 minutes with Julian Waits - How Security Operations Center leaders can create a culture of growth

Maria Henriquez
October 15, 2020

Here, we talk to Julian Waits, General Manager of Cybersecurity at Business Unit at Devo, to find out how security operations center (SOC) leaders can create a culture of growth among their teams. 


Read More
Surveillance, video wall

Improving situational awareness via video content analytics is the key to business safety and compliance for COVID-19

Driving business resilience and risk management
Stephanie Weagle
Stephanie Weagle
October 15, 2020

One thing has become clear; to abide by the “new normal” restrictions, organizations need to be constantly aware of their environments’ compliance, in real-time. To do that, they need to improve their security and situational awareness, so they can quickly assess evolving situations and respond when violations occur.


Read More
FeverWarn

Protect your hospitals, office buildings, schools and manufacturing facilities

Dr. Biplab Pal
Dr. Biplab Pal
October 15, 2020
With the emergence and continuation of the pandemic, organizations are looking for viable answers to help mitigate the immersion of remote working structures by providing real solutions that will allow organizations to get their hospitals, workforce, manufacturing and educational environments back to some sense of normal.
Read More
SEC1020-Edu-Feat-slide1_900px
Education & Training

Compelling insights into career hackers

In 39 seconds, there will be another web application attack.
Ashish Gupta
October 14, 2020

It is well known that today we live in an unprecedented time with rampant cybercrime. And now that the COVID-19 pandemic has created unparalleled challenges including worldwide unemployment and a massive financial crisis, ironically one of the industries that has flourished is the $5.2 trillion economy of cybercrime.


Read More
Study: Consumers Rely on Context when Sharing Information/information security, personal information theft, consumer trust, retail security

COVID-19 driving an acceleration in adoption of identity verification

October 14, 2020
Businesses in the UK and U.S. have been ramping up their identity verification processes in order to protect customers during the COVID-19 pandemic. 
Read More
cyber cloud

Security researcher details exploitation of common misconfigurations in Salesforce Lightning

October 14, 2020
A security researcher published a blog outlining the details of common misconfigurations in Salesforce that can result in guest users, or hackers leveraging guest user access, gaining access to sensitive data in Salesforce.
Read More
implement these easy hack into your organization's cyber security checklist to mitigate risk while remote

Simple 'back-to-virtual-school' must-haves to implement in your organization

Torsten George
Dr. Torsten George
October 14, 2020

Security professionals can incorporate a few simple items to make the remote experience safer, more secure and more productive. Here’s the “shopping list” that should be on every CSO's desk right now and translates across higher education institutions, corporations and more.


Read More
Previous 1 2 … 223 224 225 226 227 228 229 230 231 … 366 367 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing