This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • eMagazine
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • The Security Benchmark Report survey
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • Cybersecurity & Geopolitical Vodcast
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
%{topic} RSS Feed RSS

cyber security freepik

Don’t throw out your prohibited thumb drives: Liberate your workers who need more IT freedom

Marc gaffan
Marc Gaffan
March 8, 2021
The Unofficial Law of Endpoint Security Proportionality: The security measures taken to protect an employee’s endpoint are proportionate to the proximity of the employee to the company’s most valued assets. Or, put in simpler terms, the more closely an employee works with a company’s crown jewels, the more essential it is to virtually eliminate the possibility of an endpoint security breach.
Read More
5 minutes with Webster-Jacobsen

5 minutes with Bryce Webster-Jacobsen - What the new CMMC Framework means for defense contractors

Maria henriquez
Maria Henriquez
March 8, 2021

GroupSense’s director of intelligence operations Bryce Webster-Jacobsen outlines the U.S. Department of Defense’s Cybersecurity Maturity Model Certification’s Impact on Defense Contractors.


Read More
cyber security freepik

The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

Rizwan virani
Rizwan Virani
March 8, 2021

In order to combat cybersecurity threats, the Biden administration and state governors across the country should immediately work to foster deeper relationships with the private sector. Tech and government certainly don’t always get along, but the threats we face now require a national effort that would rival the Space Race of the 1960s. This can be done through state and federal governments offering financial incentives to businesses that prioritize the development and integration of cybersecurity measures, amplified communication from the government concerning the importance of cybersecurity, as well as the potential bolstering of compliance standards to minimize threats and the negative impact of breaches.


Read More
SEC0321-Campus-Feat-slide1_900px
Security Strategies

Campus safety challenges in a post-2020 world, strategies for success

The year 2020 presented society and the campus community with very difficult and unique challenges. Let’s take a look at a practical, fiscally responsible approach that security leaders can implement to maintain traditional services and respond to unique challenges, all while preparing for the unexpected.
Gregory richter
Gregory Richter
March 5, 2021

Campus police and security teams are tasked with not only providing a professional and measured response to volatile and politically charged issues, but must still maintain traditional, expected and valuable services, all within budgets that, for many campus security teams, will probably not be increasing. Let’s take a look at practical security practices campus safety leaders can implement.


Read More
artificial intelligence freepik

Will AI malware change the game?

Paul kraus
Paul Kraus
March 5, 2021
The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to detect runtime environments or sense detection attempts. Early actions were primitive compared to what we know today, but they laid the groundwork for more critical thought about adaptive and evasive technologies and sophisticated situational awareness. This lethal combination of research and deep targeting is likely the future of malware as adversaries attempt to outsmart the companies and researchers trying to thwart them. 
Read More
data privacy

Data privacy good governance and controls

Muhammad Tariq Ahmed Khan
March 5, 2021
With the inception of privacy regulatory laws and associated penalties, it has become mandatory for organizations to take necessary steps in establishing and implementing a strong privacy risk management framework. Inadequate, or the lack of, a risk management framework may present numerous organizational risks.
Read More
cyber learning freepik

Why schools need to incorporate endpoint management into their proactive cybersecurity strategy for 2021 and beyond

Apu Pavithran
March 4, 2021
Education is particularly attractive to criminals because of the vast amount of valuable data it holds: student and staff information, supplier information, alumni databases, and research data - so, as security experts, what’s to be done to help schools secure their endpoint devices?
Read More
cyber security

The integration of small business cybersecurity protection and cyber insurance: An emerging trend in 2021

Chase Norlin
March 4, 2021
Now more than ever before, the small business sector is beginning to prioritize cybersecurity and cyber liability insurance to mitigate potential crippling financial risk, which is setting the stage for a major trend moving forward: the merging of cybersecurity technology and insurance to mitigate insurer’s risk and provide the best overall coverage for small businesses.
Read More
ransomware cyber

Beware skyrocketing ransomware

Bob ackerman
Robert R. Ackerman Jr.
March 4, 2021
Ransomware – a cyberattack in which attackers hijack computer systems and demand payment to release them – has skyrocketed from a relative rarity a few years ago to the single biggest type of cybercrime today. And there is no end in sight to its growth trajectory. Last year, 2,354 American government entities, healthcare organizations and schools were the victims of ransomware attacks. The average ransomware payout swelled to $178,000 in the first half of 2020, up from $112,000 a year ago, according to ransomware incident response firm Coveware, and few clandestine culprits were caught.
Read More
cyber remote work

CISA issues emergency directive and alert on Microsoft Exchange vulnerabilities

March 4, 2021
CISA has issued Emergency Directive (ED) 21-02 and Alert AA21-062A addressing critical vulnerabilities in Microsoft Exchange products. Successful exploitation of these vulnerabilities could allow an attacker to access on-premises Exchange servers, enabling them to gain persistent system access and control of an enterprise network. 
Read More
Previous 1 2 … 5 6 7 8 9 10 11 12 13 … 197 198 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • sponsored-content-BNP-covid__3J9FMQPY3I__
    Sponsored bySureView Operations

    How command centers are responding to COVID-19

Popular Stories

Allied officially able to complete G4S acquisition

G4S acquisition comes to an end; Allied now 7th largest employer in world

cyber security

CNA Financial hit by cyberattack

messaging platforms freepik

Slack removes message invites in DM feature over harassment concerns

Workplace violence a problem

Workplace violence rises, particularly for nurses, frontline workers

ransomware - cyber

Clop ransomware gang breaches University of Colorado and University of Miami

4.22_SEC_SBS_360x184_customcontent

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing