Security Magazine Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.
- Out of Office for Summer? Cybercriminals Are Just Getting Startedon June 4, 2025 at 6:00 pm
It’s vital that business leaders keep teams engaged, vigilant and turn people into organizations’ first line of defense this summer.
- Rebuilding Digital Consent from the Ground Upon June 3, 2025 at 5:00 am
Consent is supposed to be simple. In its ideal form, it’s a clear, mutual agreement between two parties. But in today’s digital ecosystem, it’s become anything but.
- Better Together: How MFA and Strong Password Practices Can Help Bolster Securityon May 30, 2025 at 5:00 am
As threats become more sophisticated, cybercriminals are finding ways to get around MFA measures. This poses the question: is MFA enough to protect against modern threats?
- The Truth Is Always in the Code: Why Security Starts With Visibilityon May 20, 2025 at 6:00 pm
The software security field is ever-changing, but one principle remains constant: the truth is always in the code.
- How Schools Can Use Strategic Communication to Tackle Rising Cyber Threatson May 20, 2025 at 5:00 am
For school leaders, the challenges that come with cyberattacks aren’t just technical — they’re reputational.
- What Every Business Needs To Know About Multi-Factor Authenticationon May 13, 2025 at 5:00 am
Multi-factor authentication is now a cornerstone in most business’ cybersecurity strategies, offering an additional layer of protection beyond traditional passwords.
- Upskilling security teams: Breaking down silos and elevating expertiseon April 30, 2025 at 8:00 am
Cybersecurity isn’t just about technology — it’s about people.
- How higher education can protect student data from cyber siegeon April 29, 2025 at 5:00 am
Practical solutions to strengthen an educational institution’s defenses without overburdening staff or incurring significant expense.
- Frontline lessons: What cybersecurity leaders can learn from attackson April 25, 2025 at 5:40 pm
The companies that will thrive in the face of constant cyber threats are those that embed security into who they are, not just what they do.
- The Oracle breach and the case for transparent cyber responseon April 25, 2025 at 5:00 am
The Oracle breach emphasizes the importance of a transparent cyber response.
- Why every business needs a cybersecurity communications strategyon April 24, 2025 at 5:00 am
Security isn’t just a product to buy. It’s a story to tell, a culture to build, and a conversation to have, every day.
- Why red teaming matters even more when AI starts setting its own agendaon April 23, 2025 at 4:00 pm
AI tools are quickly being designed to grow more capable and more autonomous — and therefore more unpredictable.
- Amidst Tariff Uncertainty, Physical Security Can’t Take a Backseaton April 22, 2025 at 5:00 am
As tariff uncertainty swirls, businesses may be at greater risk for theft and vandalism.
- How to bridge the cybersecurity skills gap — Take a riskon April 18, 2025 at 5:00 am
Plenty of passionate, capable people are eager to join this industry, but they’re being blocked by checklists and rigid hiring mindsets.
- Why every business needs a data security strategyon April 11, 2025 at 5:00 pm
Data breaches frequently result in unauthorized access to confidential customer or employee financial and personal information.
- Campus collaboration: a security-focused work management platformon April 11, 2025 at 12:00 pm
Effective collaboration between security operators, facility teams, and other departments is essential for the smooth functioning of any organization.
- Cybersecurity’s gender issue: Why women are kept out of leadershipon April 8, 2025 at 4:00 pm
How can leaders, both male and female, better support women as they navigate this traditionally male-dominated industry?
- The new security model: A blueprint for successful SASE deploymenton April 8, 2025 at 4:00 am
A successful SASE implementation requires a standardized adoption strategy that aligns business objectives, security needs and technology priorities
- The relationship between regulation, innovation, and AI governanceon April 7, 2025 at 4:00 am
The regulatory pendulum for AI has swung in an unexpected direction.
- Advanced Security Strategies in High-Threat Environmentson April 1, 2025 at 6:00 am
In an increasingly dangerous era of global instability with evolving threats, crisis planning and mitigation is crucial.
- AI overhaul at McDonald’s needs a super-sized security approachon March 31, 2025 at 4:00 am
Introducing new technology at the many customer interfaces in quick service restaurants opens up fresh attack surfaces for threat actors.
- 5 aviation principles that elevate technical support leadershipon March 25, 2025 at 9:00 am
The precision and split-second decision-making required in aviation creates a unique foundation for leading tech support teams through critical incidents and transformative change.
- Proactive strategies to aid customer support during cyberattackson March 5, 2025 at 1:00 pm
When the worst happens, like a cyberattack, getting customer support right becomes even more critical.
- Automation alone isn’t enough to patch vulnerabilities — Here’s whyon February 26, 2025 at 6:00 am
Organizations need to consider how they approach patching as vulnerabilities increase in volume and complexity.
- Will deepfake threats undermine cybersecurity in 2025?on February 12, 2025 at 10:00 am
To combat deepfakes, organizations need to implement fresh approaches to both employee education and cybersecurity.
- Securing property in wildfire-prone areas: 5 ways to reduce riskson February 5, 2025 at 5:00 am
How security leaders can protect their businesses and employees when the next natural disaster strikes.
- Why SIEM’s obituary was written too soonon January 31, 2025 at 5:00 am
There are a few fundamental ways SIEM will need to evolve for it to stay relevant and meet today’s cybersecurity challenges.
- Vulnerability management simplified: The core essentialson January 30, 2025 at 5:00 am
In light of today’s evolving threat landscape and high-profile cybersecurity breaches, organizations are facing growing pressure to strengthen their security foundations.
- Why data protection is non-negotiable for every businesson January 21, 2025 at 5:00 am
As organizations develop security strategies and efforts to safeguard their data, there are several key pillars they must prioritize.
- 3 ways AI will transform security in 2025on January 17, 2025 at 4:59 am
Here are 3 ways that security professionals can expect AI to transform security in the year ahead.