Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

printers

Printer security: Simplicity is the key to success

bob burnett
Bob Burnett
January 12, 2021
Earlier this year, an investigation team hijacked thousands of printers all over the world to show just how vulnerable these devices can be if left unprotected. Too many organizations and individuals do not properly address them when discussing security strategies, physical or cyber, but if left unsecured, these devices can be real vulnerabilities.
Read More
5 mins with Brian H

5 minutes with Brian Harrell - Critical infrastructure protection and the power grid

Maria Henriquez
January 12, 2021

In the U.S., critical infrastructure consists of sixteen essential sectors that make daily life possible. National critical functions are the functions of government and the private sector so vital to the U.S. that their disruption, corruption, or dysfunction would have a debilitating effect on security, national economic security, national public health or safety. Here, we talk to Brian Harrell about the importance of protecting critical infrastructure, the threats and hazards that pose the greatest risks to critical infrastructure and more.


Read More
The risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in companies’ risk preparedness contingency planning.

Disinformation: Companies in the crosshairs

James Blake
James Blake
January 12, 2021

The risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in a company's risk preparedness contingency planning.


Read More
implementing PAM

Five key benefits of privileged access management

implementing PAM
FNU Divyanka
January 12, 2021

One way to achieve higher security in your enterprise is to instill a proper Privileged Access Management (PAM) initiative into the cybersecurity workflow. For a multi-dimensional cybersecurity strategy involving processes, technology, and people to be successful, any such system has to be a part of the entity’s culture. Here’s how to implement PAM at your organization.


Read More
SEC0121-Active-Feat-slide1_900px

Recognize. Respond. Survive. A new approach to workplace violence prevention

Take a proactive approach to preventing violence.
Chad Ayers Andy Sexton
January 11, 2021

If an armed assailant started shooting in your facility, could you, your employees and your organization survive? If your answer is "I have no idea," now's the time to take a proactive approach to preventing violence.


Read More
smb-cyber

How small businesses and restaurants can protect themselves from cyber threats

Patrick Thielen
Patrick Thielen
January 11, 2021

From introducing contactless payment options to offering new virtual services, small businesses moved swiftly to expand their offerings and digital capabilities in light of social distancing guidelines. In the midst of these changes, however, it’s critical for small businesses and restaurants to make sure they’re guarding against potential cyber threats. Here are key steps they can take to help ensure that they stay protected.


Read More
dataminr-gsoc6

3 key reasons why SOCs should implement policies over security standards

Ariel Assaraf
January 11, 2021

How do we respond to this increased focus on security? One option would be to simply increase the security standards being enforced. Unfortunately, it’s unlikely that this would create substantial improvements. Instead, we should be talking about restructuring security policies. In this post, we’ll examine how security standards look today and 5 ways they can be dramatically improved with new approaches and tooling.


Read More
data privacy

5 security predictions for 2021

Karen Walsh
Karen Walsh
January 8, 2021

Many organizations are planning to continue with remote work until at least late spring 2021 while others will continue to migrate to a distributed workforce as part of their long-term business plans. With all of this in mind, a quick look at the cybersecurity, privacy, and compliance Magic 8 Ball indicates that “all signs point to yes” for continued attacks and digital transformation.


Read More
Threat hunting as a cybersecurity strategy

Use threat hunting to anticipate the unknown

Paul German
January 8, 2021

Waiting for a cyber threat to make an appearance is far too dangerous to an enterprise. To combat this, threat hunting is now an essential component of any cybersecurity strategy. But how does threat hunting work in practice, and how can the approach ensure an organization’s data is kept safe?


Read More
The Uncharted Path for New Security Leaders

Considering the value of leveraging a virtual chief information security officer (vCISO)

john roman
John Roman
January 7, 2021

A company’s in-house chief information security officer (CISO) is a key component to making sure the risk of a cyberattack or security breach is greatly reduced. The responsibilities of this position are critical for businesses working to protect themselves against cyberthreats, but the reality is, some companies can’t afford to add another member to the c-suite with an average salary of up to $250K. However, there’s another option: a virtual CISO or vCISO.


Read More
Previous 1 2 … 179 180 181 182 183 184 185 186 187 … 306 307 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing