Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

Big data

Goodbye, honeypots – Hello, true deception technology

Wade Lance
Wade Lance
July 23, 2020
Honeypots were the first form of deception technology. IT security researchers started using them in the 1990s, with the intent to deceive malicious actors who had made it onto the network into interacting with a false system. In this way, honeypots could gather and assess the behavior of the malicious actors. They were not created for threat detection. However, things have changed a great deal in the years since honeypots were created – including deception technology.
Read More
cybersecurity breach

No lock is unbreakable – how history has strengthened data security

Dave Konetski
Dave Konetski
July 22, 2020
Security has been and always will be important to humans. At the deepest level, all humans have an innate desire for security and protection and this desire now extends to our digital footprint. 
Read More
5_minutes_with_C-Kennedy.jpg

5 Minutes with Chris Kennedy, CISO at AttackIQ

July 21, 2020

Get to know Chris Kennedy, CISO at AttackIQ, who previously lead the initial development of the US Marine Corps’ global incident response organization. He also held various roles in defense contracting including delivering the US Department of Treasury’s Cybersecurity Operations program, driving cybersecurity R&D, and products and services, and M&A, and most recently helped Bridgewater Associates secure their enterprise.


Read More
thermal imaging

How thermal imaging cameras will help facilities reopen in a COVID-19 world

 Jason Ouellette
Jason Ouellette
July 21, 2020

To limit the spread of the highly contagious COVID-19 virus, many businesses across the globe have deployed social distancing requirements, stringent cleaning protocols and capacity limitations as part of their plan to safely reopen. Even with these measures in place, retailers, office complexes and educational facilities are recognizing that technology will also play a critical role to help identify individuals who may have the virus even before that person enters the premises. This is where thermal imaging camera systems play a pivotal role. 


Read More
cybersecurity

Beyond the padlock: Essential steps for protecting websites

michael fowler
Michael Fowler
July 21, 2020
Here are the five most essential cybersecurity capabilities required to protect and maintain a website.
Read More
cybersecurity-blog

Protecting endpoints in the age of hybrid work environments

Feid headshot
Kent Feid 
July 20, 2020
As companies begin to strategize how their employee office structure will look over the next several months – be it phasing in a portion of the workforce into the office or considering a fully remote workforce -  top of mind will be the organization’s security posture and that IT teams can support the needs of employees and the business in a capacity that ensures a smooth, secure transition.
Read More
coronavirus

Adapting online security to the ways we work, remotely and post-coronavirus

Demian Entrekin Mark Willis
July 20, 2020
Organizations and their employees have always faced cyber vulnerabilities. However, with remote working, companies need to address the many layers of cybersecurity risks. The recent number of 'zoom bombing' incidents is a perfect example showing that the use of remote technologies at scale is causing new headaches and challenges for IT.
Read More
cyber threat

Cyberattack campaigns exploiting COVID-19 with global impact

Rui Lopes
July 17, 2020
The current COVID-19 pandemic is changing the business landscape. The most immediate being the sudden increase in the amount of people working from home. It is no surprise that this change has significantly increased the attack surface, forcing companies to strengthen their cybersecurity measures to ensure they do not become the next victim of cybercriminals.
Read More
SEC0719-Privacy-Feat-slide1_900px

CJEU invalidates EU-U.S. Privacy Shield; Upholds standard contractual clauses

david stauss
David M. Stauss
July 16, 2020
In a ground-breaking opinion issued today, the Court of Justice of the European Union invalidated the EU-US Privacy Shield Decision as a method for transferring personal data from the EU to the US. In short, the Decision was invalidated over Privacy Shield’s failure to adequately address US government surveillance activities.
Read More
Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

Enjoy the silence - overcoming noisy IDSs

antony farrow
Antony Farrow
July 16, 2020
What are some steps Security Operations Center (SOC) teams and security professionals can take to improve the performance of their Intrusion Detection Systems (IDS) tools, and lower the noise?
Read More
Previous 1 2 … 215 216 217 218 219 220 221 222 223 … 316 317 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing