Risk management and mobile devices

Risk management and mobile devices

In this episode of The Security Podcasts featuring Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, we discuss what organizations can do to manage mobile device risks. “A lot of the conversations that we have, most people are under the assumption that having a mobile device management — or some kind of management software on their mobile device — will stop all of these various different threats that we see today. Whether it’s…

Read More

The power of podcasts

The power of podcasts

A goal of the editorial team at Security magazine is to provide insightful thought-leadership focused content from security leaders to our readers through as many routes as possible. One way we do this is through our podcast channel, The Security Podcasts. In addition to our monthly eMagazine and ongoing web coverage, Security magazine regularly releases podcast episodes which feature cybersecurity and physical security leaders from various industries. These security professionals share insights and stories from their experiences and careers providing leadership…

Read More

Emerging national security threats

Emerging national security threats

In this episode of The Security Podcasts featuring Felipe Fernandez, Chief Technology Officer at Fortinet Federal, we discuss the challenges and opportunities for enterprise security professionals in the scope of national security.  “I think that the landscape just really has grown quite a bit — because you know, digital transformation, right? I think that’s something that’s changed almost the acquisition of anything. IT, OT, all of that is prevalent in almost any capability that a government organization…

Read More

Enhancing biological security preparedness

Enhancing biological security preparedness

Enhancing biological security preparedness | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

FCC bans telecom, video surveillance equipment over national security concerns

FCC bans telecom, video surveillance equipment over national security concerns

FCC bans telecom, video surveillance equipment over national security concerns | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

American disenchantment and disinformation ushering political violence and fracturing our democracy

American disenchantment and disinformation ushering political violence and fracturing our democracy

American disenchantment and disinformation ushering political violence and fracturing our democracy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

The weaponization of social media

The weaponization of social media

The weaponization of social media | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Malicious actors exploited Microsoft Exchange to hack US defense infrastructure

Malicious actors exploited Microsoft Exchange to hack US defense infrastructure

Malicious actors exploited Microsoft Exchange to hack US defense infrastructure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

DHS adds new members to Faith-Based Security Advisory Council

DHS adds new members to Faith-Based Security Advisory Council

DHS adds new members to Faith-Based Security Advisory Council | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

$2.5 million grant funds intelligence & national security career center

.5 million grant funds intelligence & national security career center

$2.5 million grant funds intelligence & national security career center | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2 3 5