Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

SEC0620-Profile-Feat-slide1_900px

Justin Dolly: Proven Security Leader

How Justin Dolly has demonstrated true security leadership over 23 years and what he brings to his CSO role at Sauce Labs
Maria Henriquez
June 3, 2020

For the past 20 years, Justin Dolly, new CSO at Sauce Labs, has been leading security at public and private companies. Over the years, how has he built security teams and played a key role in risk management, security engineering and operations and compliance initiatives at the many companies he has serviced?


Read More
SEC0620-Cyber-Feat-slide1_900px
Cyber Tactics

Unified Endpoint Security: Combating the Chaos, Complexity and Other Conundrums Plaguing Our Community

John McClurg
John McClurg
June 1, 2020

The best UES solution is one that buttresses its capabilities by simplifying administration, increasing visibility and control, reducing costs and eliminating unnecesary friction all while providing a higher value of security, productivity and user experience.


Read More
SEC0620-Leadership-Feat-slide1_900px

Leadership is Wasted on Leaders

Michael Gips
Michael Gips
June 1, 2020

There's a special place for people whose jobs don't require tremendous sacrifices but insert themselves into the fray. Many of them are security professionals.


Read More
SEC0620-cover-Feat-slide1_900px

How COVID-19 has Transformed InfoSec

COVID-19 may mean the end of the open office plan, in-person conferences and handshakes. How has cybersecurity changed, and what new role will CISOs play?
diane-2016-200.jpg
Diane Ritchey
June 1, 2020

With the sudden shift to work-from-home operations, CISOs and security teams have an important role in strengthening business continuity by ensuring that current and future remote cybersecurity work policies do not create tradeoffs between usability and security. What are three steps to address this issue?


Read More
Job Search

How to Search for a Security Job During a Crisis

Brennan-2016-200px.jpg
Jerry J. Brennan
June 1, 2020

The current circumstances we find ourselves in can offer you an opportunity to develop a strategy designed to position yourself for a security career realignment.  This planning will enable you to aggressively seek other career options. 


Read More
SEC0819-Cyber-Feat-slide1_900px

Securing the Mainframe: How Companies can Empower Security Analysts to Protect the Backbone of Their Enterprise

Christopher Perry
May 29, 2020
To apply true holistic security best practices and reduce significant risks to the mainframe, security teams must embrace an integrated mainframe security strategy.
Read More
cyber_enews

As Organizations Become Aware of Security Vulnerabilities in Cloud-Based Collaboration Applications, It’s Time to Act

Dan Teichman
Dan Teichman
May 28, 2020
New security threats are surfacing every day, driving IT and security operations teams to quickly understand and address significant security threats.
Read More
data breach

The Expanding COVID Attack Surface

How We Can Come Together to Defend Against Cyberattacks to Emerge Stronger
Tom Patterson
Tom Patterson
May 28, 2020

COVID-19 is a killer virus, with deadly outcomes every day that are profoundly impacting lives, economies and futures.


Read More
Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

3 Lesser-Known Campus Security Challenges and How to Address Them

Stuart Rawling
Stuart Rawling
May 27, 2020
What are some often-overlooked campus security pain points, and how can they be addressed?
Read More
Boon Edam Circlelock Security Portal with Internal Biometrics.jpg

Making the Security Case to the C-Suite

Greg Schreiber.jpg
Greg Schreiber
May 27, 2020

Perhaps the most significant security advancement made at the enterprise level over the last two decades has not been technology, but rather its perception.


Read More
Previous 1 2 … 205 206 207 208 209 210 211 212 213 … 300 301 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

Popular Stories

White board with the word audience written

From Fear to Action: How to Craft Cybersecurity Campaigns That Actually Change Behavior

Code

378 GB of Data From Navy Federal Credit Union Exposed

The Most Influential People in Security 2025

Security’s Most Influential People in Security 2025

Office

58% of Organizations Are Unprepared for Cyberattacks

Russian flag

Russia-Sponsored Cyber Attack Campaign Targets Networking Devices, Critical Infrastructure

Events

September 23, 2025

From Signal to Action in Seconds: How Nutrien Translates Early Warnings into Operational Confidence

When a threat emerges — how fast can your team respond? The ability to detect, validate and act with confidence can be the difference between a contained incident and a costly crisis.

September 25, 2025

Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!