Log4j bug being used in new malicious attacks Rachelle Blair-Frasier April 5, 2023 It has been more than a year since Apache released details on a critical vulnerability in Log4j, however threat actors are still exploiting it. Read More
Lumen falls victim to 2 ransomware attacks Rachelle Blair-Frasier April 3, 2023 In a recent Securities and Exchange Commission filing, Lumen Technologies, Inc. reported it was the victim of two ransomware attacks.Read More
Monitoring a workforce benefits employees and employers Tom Miller March 27, 2023 With the explosion of technology use in the workplace comes a wave of challenges for security leaders monitoring employees for concerning behavior.Read More
Leadership & Management Finding your volunteer leadership lane As security leaders, there are a number of opportunities to lead within and outside of our own organizations. Michael Gips March 15, 2023 Security leaders can look to volunteer opportunities to support the industry and share their security & management insights.Read More
Career Intelligence The challenge of ghost jobs Security professionals on the hunt for new roles should be cautious of job postings that are less reputable than they appear. Joanne R. Pollock Jerry J. Brennan March 13, 2023 Security professionals on the hunt for new roles should be cautious of ghost jobs — job postings that are less reputable than they appear.Read More
Create a P.L.A.N. for security investigations Austin Perez March 8, 2023 Corporate security investigations that leverage planning and technology are an important aspect of robust enterprise security programs.Read More
Security Strategy Keeping stadiums secure despite staffing shortages A number of security strategies and technologies can help stadium operators ensure the safety of their events. Robert Muehlbauer March 8, 2023 Access control, visitor management and crowd control technologies can help secure stadiums and arenas despite staffing shortages.Read More
Product Spotlight ISC West 2023 product preview From robotic visitor management to mobile access control credentials, Security magazine spotlights solutions from companies at ISC West 2023. Madeline Lauver March 6, 2023 From robotic visitor management to mobile access control credentials, Security magazine spotlights solutions from companies at ISC West 2023.Read More
Enterprise Services Mitigating emerging security risks Determining, prioritizing and mitigating developing risks takes planning, networking, understanding, education and patience. Sarah Ludwig Rausch March 6, 2023 Mitigating emerging security risks takes a strong intelligence network, security awareness education and alignment with the enterprise.Read More
Special Report Security's 2023 Top Cybersecurity Leaders These cybersecurity professionals bolster global information security initiatives through their dedication, influence and passion. Security Staff March 1, 2023 Security magazine’s 2023 Top Cybersecurity Leaders award program highlights the accomplishments of innovative information security professionals across sectors.Read More