Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Authors » Maria Henriquez

Articles by Maria Henriquez

5 minutes with Passwaters

5 minutes with Jason Passwaters - What cyberthreat intelligence can learn from the military

Maria Henriquez
May 27, 2021
As a former Marine with expertise in counterintelligence, Human Intelligence (HUMINT) and Technical Surveillance Counter-Measures (TSCM), Jason Passwaters leveraged his international war fighting experience and built uniquely qualified teams at iSIGHT Partners, and then in co-founding Intel 471. His military service taught him to emphasize three areas that can make threat intelligence more targeted and actionable for organizations. 
Read More
5 m with Shneider

5 minutes with Tehila Shneider - Authorization policy management in the enterprise

Maria Henriquez
May 26, 2021
While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice of confirming that someone is who they claim to be, while authorization is the process of establishing the rights and privileges of a user. Here, we talk to Tehila Shneider about authorization, authentication, and why authorizations remains a problem that is mostly unsolved. 
Read More
5 min Horev

5 minutes with Roy Horev - The evolution of DDoS attacks

Maria Henriquez
May 24, 2021
Distributed denial of service (DDOS) attacks - when an attacker attempts to make it impossible for a service to be deliverable - are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. To learn more about how these attacks have evolved over the years, we talk to Roy Horev, Co-Founder and CTO at Vulcan Cyber, a vulnerability remediation orchestration provider.
Read More
5 minutes with Waskelis

5 minutes with Todd Waskelis - Cybersecurity consulting during the pandemic

Maria Henriquez
May 21, 2021
COVID-19 brought with it a massive influx of data, most of it moving from a centralized location to the cloud (and other environments). Now, these businesses are trying to understand how to re-engineer their environment for the next 10+ years, in the advent of Zero Trust, SASE and more. How has COVID-19 impacted the need for cybersecurity consulting, specifically new trends, and Zero Trust? Here, we speak with Todd Waskelis, AVP of AT&T Cybersecurity, who leads AT&T’s cybersecurity consulting services. 
Read More
5 minutes with Johnson

5 minutes with Ben Johnson - SaaS apps security issues

Maria Henriquez
May 19, 2021
​​​​​​Ben Johnson, former NSA and Chief Technology Officer (CTO) of SaaS application security firm, Obsidian, has found that businesses around the world are adopting Software as a service (SaaS) apps in droves for collaboration, ease of access to data and business continuity. With this increased adoption, comes the inevitable trend of state-sponsored actors merely logging in to steal data rather than having to break in. Here, Johnson talks to Security magazine about security issues associated with SaaS applications. 
Read More
5 minutes w Miller

5 minutes with Todd Miller - How to build community trust for better public safety

Maria Henriquez
May 17, 2021
A recent survey conducted by Rave showed that only 22% of respondents completely trust the information they receive from local officials. Many factors – such as the spread of disinformation, social unrest and the ongoing pandemic – likely contribute to this low level of trust. However, it still poses a big problem to local leaders who are trying to keep residents safe – especially during the ongoing pandemic. We connected with Todd Miller, SVP of Strategic Programs at Rave Mobile Safety, to talk about how local governments and organizations can go about re-building trust in their communities by communicating effectively with residents.
Read More
SEC0521-ProdSpot-Feat-slide1_900px

Product spotlight on sports, stadiums and venue security

As COVID-19 remains a threat, security leaders at sporting events and entertainment venues need to pivot and change course as needed — relying on security technology, procedures and policies to support the health and safety of players, fans, visitors and staff. Here is a sampling of security technologies offered.
Maria Henriquez
May 17, 2021

As COVID-19 remains a threat, security leaders at sporting events and entertainment venues need to pivot and change course as needed — relying on security technology, procedures and policies to support the health and safety of players, fans, visitors and staff. Here is a sampling of security technologies offered.


Read More
cyber security

President Biden signs executive order to strengthen U.S. cybersecurity defenses

Maria Henriquez
May 13, 2021

U.S. President Joe Biden has signed an executive order (EO) to improve the cybersecurity of the U.S.  As the U.S. faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately people’s security and privacy, the EO seeks to improve efforts to identify, deter, protect against, detect, and respond to these actions and actors. Specifically, the EO will: 


Read More
SEC0521-Covid-ECRMC_Feat-slide1_900px

El Centro Regional Medical Center: Ensuring in-patient care during COVID-19

The Security Department at the El Centro Regional Medical Center maintained a compassionate, yet firm security presence, updating its pandemic response policies and processes, resulting in an orderly continuation of patient admissions and continuation of patient care.
Maria Henriquez
May 12, 2021

The Security Department at the El Centro Regional Medical Center (ECRMC) was put to the test, tasked with supporting the expansion of the hospital’s patient load to 50% above licensed capacity – far beyond any patient census in the hospital’s history. William DuBois, Security Department Manager at ECRMC, led the physical security through the pandemic, ensuring the Department’s updated mission of assuring the safety and security of patients, staff and visitors while maintaining the assets and business continuity of the hospital.


Read More
SEC0521-Cover_FEAT-MAIN-slide1_1170x878px

Ensuring the security of arts, museums and cultural heritage facilities during lockdown and beyond

A coordinated response effort from museums and cultural heritage institutions enable security directors to continue to ensure the security of their collections and facilities.
Maria Henriquez
May 5, 2021

To maintain a unified security and safety operation during closure, many museums and cultural heritage institutions have relied on tried-and-true security and risk management practices, and repurposed their time and energy to reassess, monitor and explore additional risk-mitigation measures to safely reopen and welcome the public back through their doors.


Read More
Previous 1 2 … 29 30 31 32 33 34 35 36 37 … 54 55 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing