Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

SEC0721-WIS-Companion-Feat-slide1_900px

A glimpse of women in the security sector today

A new generation of young professionals are joining the industry who may not have considered security as a career path previously thanks to others that have paved the way through their dedication and successes.
SEC0721-WIS-Companion-slide2_900px
Mimi Lanfranchi
July 8, 2021

Security is one of the fastest-growing professional careers worldwide. Career prospects range from entry-level security officer and administrative positions to system integration specialists and private investigators to directors of security at corporations and organizations around the world. While security is not traditionally a sector that most women considered to build their careers, the landscape has shifted dramatically.


Read More
SEC0721-WIS-Feat-slide1_900px

Security leadership: 2021 Women in Security

Get a glimpse into the professional journeys and backgrounds of 13 very talented and skilled enterprise security leaders.
Maggie Shein
Maggie Shein
July 6, 2021

In this year’s Security Leadership: 2021 Women in Security report, we take you through the professional journeys of 13 enterprise security leaders that have risen the ranks during their careers with their skills, forward-thinking mindsets, and a passion for the job they do.


Read More
network-security-freepik

When privacy and security converge: A CSO’s perspective on how security organizations can thrive

Part 3
John Scimone
John Scimone
July 1, 2021

Privacy and security become further inextricably linked as consumers’ expectations rise. With this understanding, how should businesses organize to fulfill the privacy and security promises that today’s customers expect? Dell's Chief Security Officer, John Scimone, believes that a converged operational model is the most effective and efficient approach for the majority of organizations to achieve these outcomes. 


 


Read More
SEC0721-cyber-Feat-slide1_900px
Cyber Tactics

Despite ransomware distractions, the insider risk continues

John McClurg
John McClurg
July 1, 2021

Over the last two years, ransomware has been, without a doubt, the hottest topic in cybersecurity discussions in both the cybersecurity community and the general population. Major attacks like the one on SolarWinds and against Colonial Pipeline have dominated headlines — and for good reasons.


Read More
SEC0721-Leadership-Feat-slide1_900px

Leadership & Management

Writing the future history of security research

Michael Gips
Michael Gips
July 1, 2021

It’s tempting to file the term “security research” with the likes of “jumbo shrimp” and “somewhat unique” under the heading of oxymorons. Compared to such business disciplines as law, economics, marketing, engineering, data science — and, now, even cybersecurity — business and corporate security lag behind.


Read More
SEC0721-career-Feat-slide1_900px
Career Intelligence

Interview strategies for security professionals: The virtual edition

Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
July 1, 2021

Interviews have long been sources of angst for job seekers. Adding even more stress to an already stressful situation, the pandemic caused many organizations to move almost exclusively into virtually screening candidates. Candidates now need to prepare for their 15 minutes of (on screen) fame in addition to a possible in-person interview.


Read More
supply chain - freepik

Improve supply chain security with intelligence from surface, deep & dark web

Tyler Logtenberg
July 1, 2021
Threat intelligence is only one piece of the puzzle when it comes to improving supply chain security. As part of protecting the supply chain and reducing third-party risk, here's how your organization should get started.
Read More
cloud-computing-freepik

Cloud computing is a bonanza – but security lags

Robert R. Ackerman Jr.
Robert R. Ackerman Jr.
July 1, 2021
Fact is, security in the cloud needs improvement. The problem is that cloud service providers treat cloud security as a shared responsibility with their customers. And while cloud purveyors typically hold up their end of the bargain, many customers do not. Human error among cloud customers is rampant.
Read More
insider threats freepik

Defending against insider threats in a remote world

Brian Wrozek
Brian Wrozek
July 1, 2021

The insider threat is not a new risk for security teams. And, in the wake of COVID-19 and the newly remote workforce, there has never been a greater need for organizations to better balance their efforts to defend against both external and internal threats.


Read More
5mw LaCous

5 minutes with Mira LaCous - Trends in biometric security

Maria Henriquez
June 30, 2021

Mira LaCous, Chief Technology Officer of the biometrics-led identity access management provider, BIO-key International, talks to Security magazine about current trends in biometric security.


Read More
Previous 1 2 … 155 156 157 158 159 160 161 162 163 … 312 313 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing