This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Technologies & Solutions

Technologies & Solutions
Technologies & Solutions RSS Feed RSS

SEC0720-5G-Feat-slide1_900px

CISA releases 5G strategy for secure and resilient critical infrastructure

August 25, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) released its strategy to ensure the security and resilience of fifth generation (5G) technology in the U.S.
Read More
identity theft, fraud prevention, cybersecurity, data theft

Fraud trends during the physical reopening of businesses

August 25, 2020
TransUnion’s latest quarterly analysis of global online fraud trends found that fraudsters are decreasing their schemes against businesses, but increasing COVID-19 focused scams against consumers online.
Read More
SAFER Illinois

University of Illinois at Urbana-Champaign launches Safer Illinois app

August 25, 2020
An app for University of Illinois, Urbana-Champaign faculty members, staff and students who intend to enter university facilities this fall is available for download by iPhone and Android users.
Read More
Will Security Enterprises Survive the Digital Transformation? - Security Magazine

Top 5 digital transformation use cases in the public sector

Brandyn Campbell
Brandyn Campbell
August 25, 2020
Here are five key use cases to guide, help and support digital transformation efforts to better serve constituents and government employees.
Read More
SEC0819-5G-Feat-slide_900px

Building a secure bridge for point-to-point connectivity

Michael Abad Santos
Michael Abad-Santos
August 24, 2020
The year 2020 has served up some unprecedented challenges for the human race in every aspect, with wireless connectivity more important than ever. Particularly as millions continue to work and learn remotely, our connected world of devices, vehicles, homes and cities is expanding exponentially. According to a report from GSMA and ABI Research, the number of mobile subscriptions worldwide had already reached 8.1 billion by 2017 at an annual growth rate of 5.4 percent. It’s now predicted that by 2025 the number will increase to 9.8 billion, with 3G and 4G representing 51 percent of total subscriptions and 91 percent of the total traffic generated, while 5G subscriptions are expected to exceed 849 million.
Read More
Drones: Nuisance or Serious, Immediate Threat?

FAA to test and evaluate unmanned aircraft detection & mitigation equipment at airports

August 24, 2020
The Federal Aviation Administration (FAA) announced that it plans to evaluate technologies and systems that could detect and mitigate potential safety risks posed by unmanned aircraft. The effort will be part of the agency’s Airport Unmanned Aircraft Systems Detection and Mitigation Research Program.
Read More
SEC0219-data-Feat-slide1_900px

235 million TikTok, Instagram and YouTube accounts exposed in database breach

August 24, 2020
A database breach has exposed profile data for nearly 235 million users of TikTok, Instagram, and YouTube.
Read More
Insights on Emergency Management

CISA launches emergency communications tribal webpage

August 24, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) recently launched a webpage to promote the rebranded Tribal Emergency Communications Program, which supports direct consultation to tribes and Alaska Native communities to strengthen public safety communications.
Read More
passwordenews

So, what is the safest password policy? It’s complicated

New Stu Sjouwerman CEO KnowBe4.jpg
Stu Sjouwerman
August 24, 2020
Let’s face it, passwords are a pain. As we’ve been pushed towards using longer and ever more complex passwords, and told to update them with increasing frequency, password management has become something of a headache. We’ve gone from simple, easy to remember passwords to 12- or 16-character passwords that must contain a mixture of upper and lowercase letters, numbers and symbols.
Read More
internet of things

IoT: The Internet of Threats and how users can defend themselves

Chris Clements
Chris Clements
August 24, 2020
According to IDC, by 2025 there will be 41.6 billion Internet of Things (IoT) devices, generating a massive 79 zettabytes (ZB) of data. To put that into perspective, in 2006, IDC estimated that the total amount of electronic data created and stored was a mere 0.18 ZB. This growing amount of data represents a vast and exponentially increasing attack surface, which poses a huge opportunity for cybercriminals and a seemingly insurmountable task for those responsible for protecting and securing it. This task is only made more difficult by the lack of regulation and security measures being built into IoT devices at present. As IoT looks to become a foundational aspect of our everyday lives, it’s vital we, as consumers, understand the threats posed to our devices and the data they store.
Read More
Previous 1 2 … 117 118 119 120 121 122 123 124 125 … 206 207 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

Popular Stories

Security's Most Influential People in Security 2023

Security's Most Influential People in Security 2023

open computer with green vertical text

Amerita and PharMerica announce data breach

Ava Cooper-Davis Global and U.S. Chief Security Officer Deloitte

Ava Cooper-Davis | Most Influential People in Security 2023

person using laptop next to stethoscope

Nuance Communications announces data breach affecting healthcare

vertical white lines on dark screen

CISA and FBI release joint cybersecurity advisory

SEC Exterro webinar

SEC Axis Communications webinar

Most Influential People in Security 2023

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Average Security Professionals Salary

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing