Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

cyber_lock

The Data Breach Avalanche: What is the Real Reason for Our Crumbling Defenses?

The technology to prevent data breaches exists, yet hackers are still breaking into major organizations with ease. A few best practices will help keep your sensitive data safe.
aman khanna
Aman Khanna
October 23, 2019
The volume and profile of data breaches are not only growing — they’re accelerating. In just one year, from 2018 to 2019, reported breaches jumped 54 percent. The first half of 2019 alone saw more than 4.1 billion compromised records due to hackers and poor security practices.
Read More
The 'People' Part of Enterprise Cybersecurity Strategies

Stop the Abuse! (Of Your Cybersecurity Team)

avi chesla
Avi Chesla
October 22, 2019
CCIE’s – analysts with the highest network expert certification – are spending hours a day sifting through network logs, as are Networking experts, Cloud experts, Microsoft OS experts, application experts and other valuable employees.
Read More
house of worship

Protecting Faith-Based Communities

Part 1 of 2.
Maria Henriquez
October 21, 2019

Across the United States, Americans congregate in houses of worship. However, those soft targets are vulnerable, and recently, have been attractive targets for crime, active shooters and other threats. 


Read More
Voting2

You Cast Your Vote…Or Did You?

Tom DeSot
Tom DeSot
October 18, 2019

Of late, much has been written regarding the dangers of electronic voting machines and how their security controls are either lacking or non-existent, leading to potential voter fraud or changes in how ballots are cast


Read More
Insider Threat

Insider Threat: How to Properly Govern Identities & Identify Nefarious Actors

Frank Briguglio
Frank Briguglio
October 16, 2019

Cybersecurity threats now come in many different forms. From ransomware and malware to phishing — the list of ways into an organization’s sensitive underbelly is growing.


Read More

Digital Trust: More than Just a Business Buzzword

Alexander_Moiseev
Alexander Moiseev
October 14, 2019

Last year, no business conversation was complete without someone using the words "digital transformation." This year the essential phrase appears to be "digital trust." But what does digital trust actually mean and how does it affect the cybersecurity landscape?


Read More
SEC1019-edu-Feat-slide1_900px
Education & Training

Cybersecurity for Public-Private Partnerships

SEC1019-edu-slide2_900px
Roy Hadley
October 14, 2019

As municipalities continue to harden their frontline defenses against attacks on their IT infrastructure, one area that should not be overlooked are public-private partnerships, as these are prime targets for criminals and others.


Read More
SEC1019-prodspot-Feat-slide1_900px

Product Spotlight on Mass Notification

Maria Henriquez
October 11, 2019

Security manufacturers are providing mass notification and audio solutions to improve emergency response times during active shooter incidents and other emergency events.


Read More
SEC1019-profileSEC1019-video-Feat-slide1_900px2-slide2_900px

Video Monitoring in the Sights of Guard Companies and Their Clients

How can remote guarding and video surveillance help security directors to go to sleep with complete peace of mind?
Ed Finkel
October 9, 2019
Security officer services companies and the clients who employ them are trying their best to keep on top of quickly evolving video monitoring technology.
Read More
access control/mental health genetec

How Access Control Data can Support Mental Health on Campus

terry schulenburg
Terry Schulenburg
October 8, 2019
For many students, the stress of school goes beyond academic achievement or financial pressure. Increasingly, students are also dealing with mental health issues as they pursue their post-secondary education. A recent survey of 19 colleges across eight countries published by the American Psychological Association found that one third of students identified as having at least one mental health challenge, including depression or generalized anxiety.
Read More
Previous 1 2 … 232 233 234 235 236 237 238 239 240 … 307 308 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing