Security Magazine Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.
- Why data protection is non-negotiable for every businesson January 21, 2025 at 5:00 am
As organizations develop security strategies and efforts to safeguard their data, there are several key pillars they must prioritize.
- 3 ways AI will transform security in 2025on January 17, 2025 at 4:59 am
Here are 3 ways that security professionals can expect AI to transform security in the year ahead.
- 5 emerging cybersecurity trends to watch in 2025on January 8, 2025 at 5:00 am
Increasingly sophisticated cyber threats introduce new challenges that organizations around the world must address now.
- Data deregulation to AI protection: Security priorities in 2025on January 7, 2025 at 5:00 pm
2025 will be a pivotal year as business leaders look to protect organizational and user data from damaging cyberattacks.
- Protecting healthcare data, improving trust through security measureson January 2, 2025 at 5:00 am
In today’s digital age, protecting sensitive medical information is not just a regulatory requirement but a cornerstone of trust and business integrity.
- How the web’s foundational tech is evolving in the era of remote workon December 27, 2024 at 5:00 am
Understanding the critical role of DNS in maintaining connectivity and security is essential.
- How businesses can protect themselves from data breacheson December 17, 2024 at 2:26 pm
Although PCI compliance isn’t mandated by law, failing to comply with PCI DSS can result in investigations, fines, and penalties.
- 3 potential security risks to stay ahead of post-electionon November 20, 2024 at 5:00 am
How prepared are security leaders to support their communities, customers and associates in this time of political transition?
- Comprehensive Exchange Server recovery plan for IT and exchange adminson November 11, 2024 at 6:12 pm
To prepare a recovery plan, organizations need to first understand their Exchange Server environment and configuration.
- Metrics that matter: How security professionals can show valueon November 5, 2024 at 5:00 pm
Which metrics matter? Which ones resonate with decision-makers?
- Top 8 tips for implementing MFA effectivelyon October 28, 2024 at 5:00 pm
MFA is a powerful tool in the cybersecurity arsenal that adds extra layers of security beyond just passwords.
- 5 reasons why healthcare organizations need a SIEM toolon October 18, 2024 at 5:00 am
For healthcare organizations, where breaches can have severe consequences, robust cybersecurity practices are critical.
- Hacktivism is on the ballot: Defending democracy in the 2024 electionon October 7, 2024 at 7:00 pm
Hacktivism and related attacks present a tangible threat to the integrity of democratic elections.
- Building organizational resilience for sustainable successon October 3, 2024 at 5:00 pm
Resilience — when defined properly and specifically — can be the cornerstone of comprehensive and proactive cyber risk management.
- How to prepare for the evolution of threats surrounding major eventson September 30, 2024 at 4:00 pm
As we move on from the Paris Olympics, it is important for organizations to assess their preparedness for such events and plan to be even more resilient in the future.
- SaaS governance is improving, but AI presents new challengeson September 23, 2024 at 5:00 am
What can leaders within the enterprise do to ensure they don’t lose their grip on governance?
- Liars in the wires: Getting the most from GenAI without getting dupedon September 19, 2024 at 5:00 pm
How can organizations get the most from GenAI without getting duped?
- 4 steps organizations can take to get started with AI-powered SecOpson September 19, 2024 at 5:00 am
SecOps teams need a complete solution for building, migrating and managing cloud applications and environments.
- Transform what video intelligence can become with AIon September 18, 2024 at 5:00 am
Many valuable use cases beyond security monitoring exist, but they come with more considerations and require deeper collaboration.
- Small businesses need to secure data before tapping into AIon August 20, 2024 at 5:00 am
AI isn’t just for enterprises. It’s accessible and realistic for small companies to use too — if proper data protections are in place.
- How to transform the defender’s dilemma into the defender’s advantageon August 14, 2024 at 1:00 pm
The notion that cybersecurity defenders are at an inherent disadvantage — the so-called defender’s dilemma — is incorrect and counterproductive.
- The global lessons learned from the July 19 Crowdstrike eventon August 12, 2024 at 1:00 pm
The Crowdstrike interruption highlighted the relationship between cybersecurity and global business, and not in a positive way.
- Starting a job in tech? Read this advice to maximize your experienceon July 26, 2024 at 1:00 pm
There are steps that graduates can take to make the transition from school into a Security Operations Center as smooth as possible.
- AI is coming for company credentials — Here’s how to fight backon July 24, 2024 at 5:00 pm
Where businesses see AI as a tool for efficiency and market differentiation, cyber attackers are devising new schemes to exploit undefined learning curves.
- Summer travel plans? Don’t get scammed while you’re awayon July 19, 2024 at 5:00 pm
This SecOps “Summer Survival Kit” can provide security professionals with peace of mind during vacations.
- Attending the Olympics? Watch out for these mobile threatson July 2, 2024 at 5:00 pm
For those attending the Olympics or engaging with the event via a mobile application, it’s important to know the risks.
- The power of partnership in mitigating cyber risk: A CFO’s perspectiveon July 1, 2024 at 5:00 pm
Security leaders, by closely partnering with CFOs, can ensure cybersecurity risks are considered and investments to mitigate such risks are prioritized.
- The CISO role will either flourish or vanishon June 20, 2024 at 5:00 pm
The way the role of CISO is currently structured does not set the CISO, nor the organization, up for success.
- Email obfuscation tactics elude security protectionson June 19, 2024 at 5:00 pm
Threat researchers have uncovered newly evolving email obfuscation techniques that are designed to evade modern security controls.
- Humans in AI: The necessity for human-in-the-loop (HILT)on June 18, 2024 at 5:00 am
A deliberate approach is essential for AI to be net positive, and human-in-the-loop is an essential component of this.