This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Technologies & Solutions

Technologies & Solutions
Technologies & Solutions RSS Feed RSS

cyber-shield

US Senate approves amendment to bolster cybersecurity in FY 2021 NDAA

July 27, 2020
The US Senate passed a bipartisan amendment to the FY 2021 National Defense Authorization Act (NDAA) to require the Department of Homeland Security to establish a Cybersecurity State Coordinator position in every state.
Read More
school safety

75% of US public schools need security improvements for students with disabilities

July 24, 2020
A new US Government Accountability Office (GAO) study found two-thirds of school districts had facilities with physical barriers that may limit access to students with disabilities.
Read More
SEC0519-Cyber-Feat-slide1_900px

New York may ban facial recognition tech in schools until 2022

July 24, 2020
Lawmakers of the state of New York have passed legislation to pause the use of facial recognition technology in schools until 2022. The moratorium was introduced by State Senator Brian Kavanagh (D-Manhattan and Brooklyn) and Assemblymember Monica Wallace (D-Lancaster).
Read More
Revised NIST Cyber Security Framework - Security Magazine

DISA outlines new cybersecurity model at Army Signal Conference

July 24, 2020
Navy Vice Adm. Nancy A. Norton, the director of Defense Information Systems Agency (DISA) and commander of Joint Force Headquarters-Department of Defense Information Network, outlined the way ahead for a cybersecurity paradigm shift that will help the U.S. military maintain information superiority on the digital battlefield.
Read More
The Long and Winding Road to Cyber Recovery

NSA and CISA recommend immediate actions to reduce exposure across operational technologies and control systems

July 24, 2020
The Cybersecurity and Infrastructure Agency (CISA) and the National Security Agency (NSA) have issued an activity alert due to the recent malicious cyber activity against critical infrastructure (CI) by exploiting internet-accessible operational technology (OT) assets.
Read More
Gaps in Cybersecurity Programs

The risky door that telecommuting can open to your network

Benny lakunishok
Benny Lakunishok
July 24, 2020
With telecommuting here to stay, now is the perfect time to re-examine just how much network access you are giving your users and machines. You might be shocked to see how open your network really is. Most organizations allow more access than their users or machines will ever need or should ever have – this excessive trust is what allows attackers who get into the network to spread and cause a lot of damage.
Read More
workplace

84% of employees concerned about returning to the physical workplace during COVID-19 pandemic

July 24, 2020
Despite intentions of returning to onsite operations in 2020, many employees remain concerned about their organization’s plans to ensure their health and safety. In June 2020, Traction Guest did a two-part survey consisting of 300 employees and 300 enterprise risk management, physical security and facilities management professionals in companies with at least 1,000 employees.
Read More
brian lynch

Brian W. Lynch, security expert, named Executive Director of Safety and Security at RANE

July 23, 2020
Brian W. Lynch, a former FBI and Vanguard executive with leadership experience in security, risk, law enforcement, and anti-terrorism, will become the new Executive Director of Safety and Security at RANE (Risk Assessment Network + Exchange). 
Read More
Big data

Goodbye, honeypots – Hello, true deception technology

Wade lance
Wade Lance
July 23, 2020
Honeypots were the first form of deception technology. IT security researchers started using them in the 1990s, with the intent to deceive malicious actors who had made it onto the network into interacting with a false system. In this way, honeypots could gather and assess the behavior of the malicious actors. They were not created for threat detection. However, things have changed a great deal in the years since honeypots were created – including deception technology.
Read More
cybersecurity breach

No lock is unbreakable – how history has strengthened data security

Dave k
Dave Konetski
July 22, 2020
Security has been and always will be important to humans. At the deepest level, all humans have an innate desire for security and protection and this desire now extends to our digital footprint. 
Read More
Previous 1 2 … 124 125 126 127 128 129 130 131 132 … 203 204 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

2023 Top cyber security leaders

Security's 2023 Top Cybersecurity Leaders

CT scanner

Cybersecurity threats to medical devices are a growing concern

Empty conference room

Cyber risk is a business risk

laptop phone.jpg

31% of organizations had users fall for phishing attack

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing