This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Keywords » digital security

Items Tagged with 'digital security'

ARTICLES

Internet of Things

The IoT Cybersecurity Improvement Act: A first step in bolstering smart technology security

Erez yalon checkmarx
Erez Yalon
February 25, 2021
The IoT security bill is a step in the right direction, as it addresses one of the biggest gaps in software security overall -- generating awareness. But, as the use of connected devices continues to exponentially grow over time, we must ask ourselves: is it enough? Let’s explore.
Read More
fraud alert

Cybercrime report finds young adults and adults over 75 most vulnerable to fraud attacks

February 25, 2021
LexisNexis Risk Solutions released its biannual Cybercrime Report covering July 2020 through December 2020, which details how the evolving threat landscape created new opportunities for cybercriminals around the world, particularly as they targeted new online users.
Read More
SEC0719-Privacy-Feat-slide1_900px

Executive protection has gone digital

Rich Matta
January 21, 2021

The field of executive protection has been expanding and redefining itself in real-time. Today, executive protection has advanced far beyond securing locations and bodies in the physical realm to also safeguarding online identities and reputations in the digital realm.


Read More
document security

How to improve legal document security in six steps

Ben  Liu
January 19, 2021

In legal professions, safeguarding documents and paperwork is an essential office task. These papers may contain important, private information about a company’s operations, or they may include other privileged information shared by clients concerning their cases. In an increasingly digital world, the lock and key of the filing cabinet are no longer enough to guarantee document security. How can your practice better protect the digital files it stores? Take a moment to consider these six tips for implementing better security surrounding these important documents.


Read More
identity theft, fraud prevention, cybersecurity, data theft

9 reasons digital fraud is on the rise

Jordan reynolds
Jordan Reynolds
November 12, 2020

What is causing digital fraud to rise year over year? From current trends and consumer attitudes to technological enhancements and more sophisticated tactics, let’s take a look at the top nine reasons digital fraud is rapidly increasing:


Read More
DellTech

Global pandemic accelerates digital transformation according to latest study

Dell Technologies' third biennial Digital Transformation Index details how organizations are accelerating digital transformation projects amidst unprecedented uncertainty; 4,300 business leaders in 18 countries weigh in
November 4, 2020
Dell Technologies released results from a global study that shows organizations are shifting their digital transformation programs into high gear and are on the path to accomplish in a few months what would normally have taken them years. The findings, updated biennially in the Dell Technologies' Digital Transformation Index (DT Index), indicate organizations are accelerating transformational technology programs during the global COVID-19 pandemic.
Read More
900x550_G4S_ESRM_0001_Budget.jpg

New poll suggests enterprises should harden systems against unconventional attack vectors

October 29, 2020

SafeGuard Cyber announced the results of a new survey of 600 senior enterprise IT and security professionals. The study revealed the need to harden unconventional attack vectors in cloud, mobile, and social media technologies. Moreover, enterprise organizations are juggling the twin demands of budget constraints and the need to drive business outcomes.


Read More
voting - election

Why the 2020 election is already being hacked

Amit Bareket
October 26, 2020
Any apparent election interference from countries like Iran and Russia is typically met with partisan posturing. But while politicians are busy debating which candidate might benefit, there’s a good chance that someone, somewhere, is trying the same thing again right now. Foreign interference like the recent incident announced by the U.S. Director of National Intelligence John Ratcliffe is more common than ever because no online data is completely safe from hackers, and digital data is valuable for what it reveals. 
Read More
digitalization

Smooth digital transactions essential to business survival during and after pandemic

October 23, 2020
A new global study by the Economist Intelligence Unit and TransUnion has overwhelmingly found the key to whether or not companies go out of business hinges on providing consumers friction-right digital transactions. Nearly 85% of global executives surveyed as part of the study said they believe smooth digital transactions are “essential to business survival” rather than merely a competitive edge. 
Read More
cybersecurity

Mailfire data breach exposes more than 320 million records and PII of 70 websites

September 16, 2020
vpnMentor’s research team recently received a report from an anonymous ethical hacker about a massive data leak exposing users of over 70 adult dating and e-commerce websites from around the world.
Read More
More Articles Tagged with 'digital security'
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • sponsored-content-BNP-covid__3J9FMQPY3I__
    Sponsored bySureView Operations

    How command centers are responding to COVID-19

Popular Stories

ransomware - cyber

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

Potawatomi Casino implements temp detection and touchless weapons detection for improved safety and security

Milwaukee-based Potawatomi Hotel & Casino implements touchless screening for guests

Security guards Allied, gardaworld and G4S

GardaWorld and Allied Universal to enter bidding war over G4S

cyber hack

5 biggest cybersecurity threats

SEC0321-Cover-Feat-slide1_900px

The 2021 Top Cybersecurity Leaders

2.16_SEC_SBS_REV_360X180_customcontent

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing