Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Security Top Stories

Security Top Stories
Security Top Stories RSS Feed RSS

Inside of water disposal pipe

Best practices for securing critical and public infrastructure

Rebecca Herold Headshot
Rebecca Herold
May 14, 2024

Entities supporting critical infrastructure components must implement a comprehensive set of physical and technical tools and practices.


Read More
Operating theater

How the Change Healthcare breach can prompt real cybersecurity change

Ilona Cohen headshot
Ilona Cohen
May 14, 2024

After the number of health data leaks hit a new record last year, healthcare providers should be leveraging all the tools available to protect themselves and their patients from malicious criminals. 


Read More
Network of cables

Segmentation, data diodes and NSA’s zero trust guidance

Sherard Savage Headshot
Sherard Savage
May 13, 2024

While the NSA’s guidance on fortifying the network and environment pillar of Zero Trust through segmentation is impactful, many organizations still have a demand for connectivity.


Read More
Digital Trust Ecosystem Framework
Cyber Tactics

Building digital trust with ISACA's framework

Implementing the Digital Trust Ecosystem Framework empowers organizations to embark on a transformative journey.
Pam Nigro headshot
Pam Nigro
May 13, 2024

In today's digital landscape, organizations must navigate a complex web of challenges, from cybersecurity threats and data privacy concerns to the integration of emerging technologies.


Read More
Mental Health Awareness
Security Talk

Guarding the guardians: Importance of mental health for security personnel

This Mental Health Awareness Month, security leaders discuss mental health and safety in organizations.
Rachelle Blair-Frasier, Editor in Chief
Rachelle Blair-Frasier
May 10, 2024

This Mental Health Awareness Month, security leaders discuss mental health and safety in organizations.


Read More
what makes a great leader
Leadership & Management

Need a new leadership style? Line up the contenders

New leadership theories could replace current thinking of what makes a great leader and how one is developed.
Michael Gips
Michael Gips
May 10, 2024

In the next few decades, if not years, a new leadership theory is bound to upend the current notions of what makes a great leader and how one is developed.


Read More
Job search
Career Intelligence

Online security job leads

Tips for security professionals searching through job boards.
Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
May 9, 2024

Security job seekers have many ways to find job leads. For the sheer volume of apparently potential opportunities, though, it is hard to ignore job boards.


Read More
Retail Security
Education & Training

Navigating retail security challenges: A comprehensive approach

Protecting retail spaces requires a thorough security approach to keep employees and guests safe.
Alan Saquella
Alan Saquella
May 9, 2024

Retail spaces can be exposed to a number of risks, meaning security leaders need to be extra careful when creating security plans.


Read More
Vulnerability Exploitation
Global News

Vulnerability exploitation on the rise

Taelor Sutherland, Associate Editor
Taelor Sutherland
May 8, 2024

The most commonly exploited vulnerabilities.


Read More
Data Breach
Global News

Data breaches increased throughout 2023

Taelor Sutherland, Associate Editor
Taelor Sutherland
May 8, 2024

Companies experience a rise in data breaches.


Read More
Previous 1 2 … 59 60 61 62 63 64 65 66 67 … 314 315 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing