Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
Security Enterprise Services RSS Feed RSS

API-aws-freepik1170.jpg

Zero trust as foundation of API security

Matt Graves.jpg
Matt Graves
May 16, 2022

Without zero trust as the foundation of your security, the APIs you use could become weak points.


Read More
video surveillance
Product Spotlight

Product spotlight on video surveillance

Madeline Lauver
May 16, 2022

From drone security footage to video wall management, Security magazine spotlights video surveillance solutions and tools.


Read More
globe
Global News

Security professionals examine top 5 emerging risks

Madeline Lauver
May 16, 2022

The 15th Annual Survey of Emerging Risks surveyed risk and security leaders about the top emerging risks this year and beyond, including climate change, pandemic development and more.


Read More
cybersecurity-controls-freepik1170x658.jpg

Chad Kalmes named Chief Information Security Officer at Socure

Security Staff
May 13, 2022

As new CISO at Socure, Chad Kalmes will direct Socure’s strategy and operations across the security, technology, and risk & compliance functions.


Read More
cyber-security-56-freepik1170x658.jpg

Managed service providers face increased cyber threat from APT groups

Security Staff
May 13, 2022

Cybersecurity agencies have observed an increase in malicious cyber activity targeting managed service providers (MSPs) and expect this trend to continue.


Read More
ransomwarev7-freepik1170x658.jpg

COBALT MIRAGE conducts ransomware operations in US

Maria Henriquez
May 13, 2022

Iranian APT known as Cobalt Mirage focuses on ransomware attacks against U.S. targets for financial gain, according to Secureworks threat intelligence.


Read More
matches
Security Risk Management

Practical tips for effective risk management in crisis situations

Consider these steps before, during and after a crisis to better protect your organization and manage risk more effectively.
Brownyard headshot
Tory Brownyard
May 13, 2022

Six steps security leaders can take before, during & after a crisis to better protect themselves, manage risk more effectively, & reduce liability.


Read More
risk-management-freepik1170x658.jpg

Building a risk management program

Mike Parkin
May 13, 2022

What are the tools and processes necessary to develop a comprehensive security program into a mature vulnerability assessment and risk management program?


Read More
cyber-data-freepik1170x658x82.jpg

7 steps to combat cybersecurity threats in times of instability

Steve Durbin CEO ISF.jpg
Steve Durbin
May 13, 2022

Discover steps security teams can follow for understanding potential threats in times of instability and be better armed for any sort of contingency.


Read More
health-cyber-freepik1170.jpg

Compliance in healthcare: The HITRUST framework

Phil-Jones-bio-full.jpg_profile.jpg
Philip Jones
May 13, 2022

There are several reasons an organization should look to become HITRUST certified: improved competitive advantage, cybersecurity, risk management and more.


Read More
Previous 1 2 … 79 80 81 82 83 84 85 86 87 … 367 368 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing