Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

James Woolsey talks to Security magazine about election security and electromagnetic pulses

5 minutes with James Woolsey – On securing U.S. voting systems now and into the future

Maggie Shein
Maggie Shein
November 3, 2020
Former Central Intelligence Agency (CIA) Director R. James Woolsey Jr., a veteran of four presidential administrations and one of the nation’s leading intelligence experts, believes we should be worried about election security on a number of levels — though he says there are some relatively easy fixes. Woolsey discusses security threats surrounding the voting process, measures that can be put in place to mitigate those risks, as well as the biggest security threat to the U.S. outside of election security.
Read More
Picture1

The 2020 Security 500 Methodology

diane-2016-200.jpg
Diane Ritchey
November 3, 2020

The Security 500 tracks 17 vertical markets and collects unique data where appropriate (such as number of unique facilities in healthcare) and applies this data to key metrics.


Read More
SEC1120-500-Sectors-Feat-slide1_900px

The 2020 Security 500 Sector Reports

diane-2016-200.jpg
Diane Ritchey
November 2, 2020

What are the critical issues and trends in your sector this year, and how does your enterprise compare to your peers? These 17 Security 500 Sector Reports provide benchmarking data about budget changes, security leadership responsibilities, reporting structure and more.


Read More
SEC1120-500-Cover-Feat-slide1_900px

The 2020 Security 500 Report

diane-2016-200.jpg
Diane Ritchey
November 2, 2020

Welcome to the 2020 Security 500 report, which includes the 2020 Security 500 rankings and sector reports.


Read More
SEC1120-cyber-slide2_900px
Cyber Tactics

In pursuit of diversity

John McClurg
John McClurg
November 1, 2020

Last month, in this column, we advanced a discussion of the hermeneutics involved in the interpretations we make daily and of our growing propensity to commit Group Attribution Error.


Read More
SEC1120-Leadership-Feat-slide1_900px
Leadership & Management

Every breath you take, they’ll be watching you

Michael Gips
Michael Gips
November 1, 2020

A couple of months ago, I described in this column how security professionals could unify a divided country. I chose a mask as a symbol of that cohesiveness. But that thin piece of fabric worn around the mouth and nose can also be a gag — a barrier that distances leaders and stifles communication.


Read More
SEC1120-Career-Feat-slide1_900px
Career Intelligence

Leadership qualities for career success

Brennan-2016-200px.jpg
Jerry J. Brennan
November 1, 2020

In past articles, I have written about behaviors and style characteristics that tend not to be valued by organizations and that have proven often to be the underpinnings of why some security leaders fail in their roles. The counterbalance to that are leadership attributes and behaviors that are essential for success.


Read More
5 mins with Dr. Brumley

5 minutes with Dr. David Brumley - Capture the Flag cybersecurity competitions and how to get started

Maria Henriquez
October 30, 2020
Rigorous training as to how hackers are able to get into systems and access sensitive data and how to defend against an onslaught of cyberattacks has given rise to a specific type of training and competition for cybersecurity professionals: Capture the Flag (CTF). To find out more about these competitions, we talk to Dr. David Brumley, CEO of ForAllSecure, Inc. and Professor of Electrical and Computer Engineering and Computer Science at Carnegie Mellon University. 
Read More
From the ER to the Executive Suite, Hospitals Tighten Up

Don’t let your guard down over IT security during the pandemic

Lee Barrett
Lee Barrett
October 30, 2020
Healthcare providers remain firmly focused on dealing with the global pandemic, juggling the often-conflicting demands of providing care while keeping patients and staff safe. The financial impact of the pandemic has left many providers on the brink of bankruptcy amid falling patient visits deferred elective surgeries, and insufficient government aid to “fill the gap.”
Read More
faking social responsibility may get your company hacked according to University of Delaware research

Faking social responsibility may get you hacked

Sunny Rosen
October 30, 2020
New research from University of Delaware's Lerner College Professor John D’Arcy suggests that some hackers may be motivated by disappointment in a company’s attempts to fake social responsibility.
Read More
Previous 1 2 … 183 184 185 186 187 188 189 190 191 … 298 299 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Multicolored code on black screen

Security Leaders Share Thoughts on DaVita Data Breach

Coding on screen

CISA Releases a Malware and Forensic Analysis Platform

Full train

Scattered Spider’s Newest Targets: Transportation and Airlines

Young man working on laptop in coffee shop

Multi-Job Hustles Expose Workers to Higher Cybersecurity Risks

Man signing paper

Allianz Life Insurance Impacted By Third Party Breach

Events

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

September 9, 2025

Actionable Strategies to Mitigate Active Assailant Risk

Active assailant incidents are surging — Are you ready? 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing