Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Ask the Five Ws to Enhance Your Physical Identity and Access Management Program - Security Magazine

Why identity and access management is critical to securing a remote workforce

July 1, 2020

Identity and access management (IAM) protects the business while keeping employees securely connected, but were organizations prepared for their employees to work from anywhere? LastPass ran a study with IT decision makers, in partnership with IDG, to discover the impacts of remote work to IAM and found that IAM is critical to securing a remote workforce, but almost all organizations have had to adjust their IAM strategy to securely enable employees to work from anywhere.


Read More
ISC2

(ISC)2 Security Congress 2020 now a virtual conference

July 1, 2020

(ISC)² announced that its 10th annual (ISC)² Security Congress will take place as a virtual conference, November 16-18.


Read More
Encryption Future - Security Magazine

US Senators introduce the Lawful Access to Encrypted Data Act

July 1, 2020

U.S. Senators introduced the Lawful Access to Encrypted Data Act, a bill to bolster national security interests and better protect communities across the country by ending the use of “warrant-proof” encrypted technology by terrorists and other bad actors to conceal illicit behavior.


Read More
Ethics

SIA adopts new ethics principles

July 1, 2020
The Security Industry Association (SIA), through its Ethics in Security Technology Working Group, has developed the SIA Membership Code of Ethics, a set of nine ethics principles designed to promote the highest standards of conduct among its members.
Read More
SEC0720-Cyber-Feat-slide1_900px
Cyber Tactics

Zero trust further considered - another benefit of living in the times of AI

John McClurg
John McClurg
July 1, 2020

The path to securing the remote workforce should be seamless and experienced as a hassle-free balance between safety and a quality user-experience. It is pivotal to implement appropriate security practices, as inadequate measures can lead to unmanaged risks and the endangerment of corporate systems, data and employees.


Read More
ISACA logo

ISACA announces 2020-2021 Board of Directors

July 1, 2020

Global technology association ISACA recently installed its 2020-2021 Board of Directors at its virtual Annual General Meeting, featuring a strong combination of executive expertise and association and chapter leadership experience.


Read More
Revised NIST Cyber Security Framework - Security Magazine

Leveraging packet data to improve network agility and reduce costs

Mark Doering
Mark Doering
June 30, 2020
Traditional network management approaches of multiple point products, manual change processes, monolithic policies and data silos no longer work. Business, risk, service and security assurance programs all need to be agile, efficient and anticipate future threats and remedies.
Read More
The Port of Los Angeles

Risk management concerns rising at ports as COVID-19 disruption grows

June 30, 2020
The spread of COVID-19 and the economic and trade disruption the pandemic has caused is prompting port managers to examine new ways to improve risk management and digital processes, according to the latest global ports survey conducted by Remy InfoSource.
Read More
keys-cyber-enews

Georgia State named National Center of Academic Excellence in Cyber Defense Research and Education

June 30, 2020
The National Security Agency (NSA) and the Department of Homeland Security (DHS) have designated Georgia State University as a National Center of Academic Excellence in Cyber Defense Research and a National Center of Academic Excellence in Cyber Defense Education through 2025.
Read More
hacker- enews

Russian cybercriminal group targeting American remote workers

June 30, 2020
A Russian ransomware group whose leaders were indicted by the Justice Department in December is retaliating against the U.S. government, many of America’s largest companies and a major news organization, identifying employees working from home during the pandemic and attempting to get inside their networks with malware intended to cripple their operations, reports The New York Times. 
Read More
Previous 1 2 … 529 530 531 532 533 534 535 536 537 … 686 687 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing