Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Keywords: » security strategies

Items Tagged with 'security strategies'

ARTICLES

Woman working on computer

Why every business needs a data security strategy

Simister headshot
Aidan Simister
April 11, 2025

Data breaches frequently result in unauthorized access to confidential customer or employee financial and personal information.


Read More
 Risk management

IT leaders stress the need for stronger risk management

Taelor Daugherty
Taelor Sutherland
September 11, 2024

IT leaders request stronger risk management.


Read More
Futuristic digital monolith

Preparing for a post-quantum future amid machine identities

Bocek headshot
Kevin Bocek
August 30, 2024

By focusing on machine identity management practices that incorporate post-quantum cryptography, organizations can build a secure foundation in both the present and the quantum future.


Read More
Woman in tech offfice

Getting API security right: Ensuring robust protection

Morales headshot
Carlos Morales
July 30, 2024

APIs have become pervasive and extremely valuable targets for bad actors. 


Read More
Honey dripping

New honeypot techniques for addressing targeted attacks

Grant headshot
Daniel Grant
July 22, 2024

Defenders should define their honeypot strategy by identifying attack risks and intelligence gaps. 


Read More
Woman with luggage and laptop on beach

Summer travel plans? Don’t get scammed while you’re away

Corey Nachreiner
Corey Nachreiner
July 19, 2024

This SecOps “Summer Survival Kit” can provide security professionals with peace of mind during vacations. 


Read More
Padlock on keyboard

Locking out ransomware: A new way to look at security strategy

Wessels Headshot
Denzil Wessels
July 17, 2024

Ransomware attacks are accelerating at a record pace, becoming dramatically more frequent and more sophisticated. 


Read More
Drawing a flowchart

Recovery point objectives 101: Planning for cyberattacks

Thorsen headshot
Todd Thorsen
July 1, 2024

Recovery point objectives and data recovery capabilities are foundational to a solid disaster recovery plan. 


Read More
Medicine and medical equipment

Beyond the breach: The ongoing fragility of healthcare cybersecurity

Manglicmot headshot
Mark Manglicmot
June 13, 2024

A wave of ransomware attacks disrupting clinical operations and forcing hospitals to turn away patients is the latest reminder of the fragility of life-saving infrastructure. 


Read More
Empty meeting room

OpenAI Board establishes Safety and Security Committee

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
May 30, 2024

A Safety and Security committee has been formed by the OpenAI Board. Security leaders are sharing their thoughts. 


Read More
More Articles Tagged with 'security strategies'

EVENTS

Webinar Sponsored Webinars Solutions by Sector Featured Event Webinar Sponsored Webinars

6/20/24 to 6/20/25
Contact: Amy Jackson

Turning Threats into Solutions in Today's Cyber Landscape

ON DEMAND: This webinar will also explore lessons learned and the evolving threat landscape of cybersecurity within local governments and how these key challenges and tactics can develop an effective security strategy. Read More

Webinar Solutions by Sector

9/19/24 to 9/19/25
Contact: Vania Halabou

Mastering the Fundamentals: Mitigation, Prevention, and Response to Violence

ON DEMAND: Organizations face a plethora of threats, including altercations, overdoses, robberies, intruders, angry clientele, and active shooters. Mastering the fundamentals of safety is key to reducing all forms of violence and disruption, not only in the K-12 space but in other industries as well.  

Read More

Sponsored Webinar

10/29/24 to 10/29/25
Contact: Amy Jackson

Data-Driven Security: Turning Incidents into Strategic Assets

ON DEMAND: Are you looking for tips on how to turn everyday data into a powerhouse for your security strategy? Join us for our webinar, "Data-Driven Security: Turning Incidents into Strategic Assets," and find out how to unlock the full potential of your incident data.

Read More

Sponsored Webinar Solutions by Sector

1/30/25 to 1/30/26
Contact: Amy Jackson

Iconic and Secure: Security Lessons Learned at Georgetown University

ON DEMAND: Georgetown University, a major international research university with nine schools, an affiliated hospital, and many highly-ranked academic programs, has a mature, layered security program.

Read More
More Events Tagged with 'security strategies'
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing