This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Technologies & Solutions

Technologies & Solutions
Technologies & Solutions RSS Feed RSS

risk management

The 5 must do’s for every workplace risk management plan

First and foremost, employers must have a plan
Joe Hendry
September 30, 2020
Workplaces are going to need to adapt and adopt training and risk assessment protocols to keep employees healthy and safe. Below are five, foundational steps to take when developing a workforce risk management plan.
Read More
internet of things

Five key steps to full device defensibility

Part 3: Protecting distributed IoT devices
Bud Broomhead
September 29, 2020
To help you and your organization plan and implement an improved cyber hygiene program, we now present a framework for full IoT device defensibility in real world deployments at scale. This framework represents current state-of-the-art best practices for protecting IoT devices, and can form the backbone of your assessment, evaluation, and improvement plans. Follow the steps below to strengthen your network defenses.
Read More
The Cyber 101 Discussion

2020 Travelers Risk Index finds fewer companies taking steps to mitigate cyber threats despite increased concern

September 29, 2020
The Travelers Companies, Inc. announced the results of the 2020 Travelers Risk Index, which found that fewer companies than last year have taken steps to mitigate cyber risks, even though the level of concern about these threats has increased during the COVID-19 pandemic.
Read More
amazon ring

Amazon unveils "flying camera" that launches if intrusions are detected

Maria Henriquez
September 28, 2020
Amazon's smart home security division Ring has unveiled a flying camera that launches if sensors detect a potential home break-in. It is designed to activate only when residents are out, works indoors, and is limited to one floor of a building.
Read More
remote-enews

Four ways to stop cybercriminals from capitalizing on your remote workers

shena tharnish
Shena Tharnish
September 28, 2020

Cybercriminals love a crisis. As most of the workforce continues operating remotely, how can you stop cybercriminals from exploiting your business? Here are four secure ways to manage a distributed workforce.


Read More
insider threats

Tinker Tailor Business Spy: What entrepreneurs don’t know (that can hurt them)

Craig Singleton
Craig Singleton
September 28, 2020
As September is National Insider Threat Awareness Month, there is no better time than the present to seriously reconsider how we educate America’s next generation of business leaders about these critical intelligence issues. As we wait on MBA programs to catch up to America’s new geopolitical reality, these are the three most important issues business schools, early stage entrepreneurs, and even seasoned pros should consider as they protect their life’s work.
Read More
risk management

GRC leaders lack confidence in security data they provide to regulators

September 28, 2020
Senior risk and compliance professionals within financial services company’s lack confidence in the security data they are providing to regulators, according to Panaseer's 2020 GRC Peer Report. Results from a global external survey of over 200+ GRC leaders* reveal concerns on data accuracy, request overload, resource-heavy processes and lack of end-to-end automation.
Read More
cloud

SailPoint report reveals security risks of IaaS cloud infrastructure

September 28, 2020
To understand current cloud infrastructure (IaaS) utilization and management practices, SailPoint, in partnership with dimensional research, surveyed executives and governance professionals who are directly involved with IaaS compliance and governance. The report reviews the global research survey which investigates current issues, risks, and challenges with IaaS environments as well as the tools used to manage access and governance of those environments.  In addition, the report found that a large majority (74%) of companies use more than one IaaS provider, with some companies reporting using as many as seven and eight – which can lead to significant security issues.
Read More
gsx+

ASIS announces Awards of Excellence and Outstanding Security Performance Awards (OSPAs)

September 25, 2020
In a 360-degree virtual tour of Long View Gallery in Washington D.C., ASIS announced its Awards of Excellence Friday afternoon to conclude the 2020 GSX+ virtual conference. The Outstanding Performance Security Awards (OSPAs) were also announced at this time.
Read More
Lance Dubsky

Lance Dubsky named chief security officer at Quintillion

September 25, 2020
Lance Dubsky was named chief security officer at Quintillion. Dubsky is charged with ensuring the company's current corporate, physical, and cybersecurity, as well as positioning Quintillion to support a secure U.S. Arctic.  
Read More
Previous 1 2 … 100 101 102 103 104 105 106 107 108 … 206 207 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

Popular Stories

Security's Most Influential People in Security 2023

Security's Most Influential People in Security 2023

Human hand and AI Hand

Study finds increase in cybersecurity attacks fueled by generative AI

open computer with green vertical text

Amerita and PharMerica announce data breach

Ava Cooper-Davis Global and U.S. Chief Security Officer Deloitte

Ava Cooper-Davis | Most Influential People in Security 2023

person using laptop next to stethoscope

Nuance Communications announces data breach affecting healthcare

SEC Exterro webinar

SEC Axis Communications webinar

Most Influential People in Security 2023

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Average Security Professionals Salary

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing