The voices of security

The voices of security

As one of the preeminent security executive publications, the editorial team at Security magazine works to center the voices of security leaders via as many routes as possible. One of these avenues is via our podcast channel, The Security Podcasts. In addition to our monthly eMagazine and constant web coverage, Security magazine releases bite-sized podcast episodes featuring cybersecurity and physical security leaders from across the industry. From team leadership advice to explorations of emerging security…

Read More

The value-add of security metrics

The value-add of security metrics

Enterprise security functions that collect and analyze data can identify trends to improve their teams and prove the value of security within the organization. From tracking workplace violence incidents to facility access patterns, enterprise security teams use data to forge relationships across the business and evaluate their own successes and improvements. Below, we explore how four enterprise security functions have embraced data to improve operational efficiency, enterprise-wide communication and security buy-in from organizational leadership. YAZAKI…

Read More

Avoiding offboarding red flags

Avoiding offboarding red flags

In this episode of The Security Podcasts featuring Yoav Kalati, VP Product at Software as a Service Security Posture Management company Wing Security, we discuss the security challenges and red flags organizations face when it comes to offboarding employees. Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts! Source link

Read More

Top security conferences in 2024

Top security conferences in 2024

Security conferences provide both public and private sector security leaders with an opportunity to network with colleagues, learn about new business & security strategies to develop their own physical security & risk programs. Security magazine brings you a list of the top physical security conferences to attend across the world in 2024. ASIS Europe Vienna, Austria March 20 — 22, 2024 ASIS Europe brings together aspiring and established security leaders from across the continent and…

Read More

Security leadership philosophy and LinkedIn communication style

Security leadership philosophy and LinkedIn communication style

Reading a LinkedIn post by security professional Tyler Schmoker is like reading an e.e. cummings poem. The Poetry Foundation describes cummings’ work as “spare and precise, employing a few key words eccentrically placed on the page,” grammar and punctuation sprinkled idiosyncratically. Now take that, add some emojis, generous use of the “return” key, lots of ellipses and a breadcrumb-like progression down the page, and you approximate a Schmoker original. Then there’s the subject matter, which…

Read More

Challenges of deep fakes in cybersecurity

Challenges of deep fakes in cybersecurity

Deepfakes have been making the headlines with the technology being utilized in social engineering attacks and phishing schemes. In this episode of The Security Podcasts featuring Brent Arnold, a partner practicing in Gowling WLG’s Advocacy department, we discuss the challenges the security industry faces with more and more convincing deepfakes making the rounds. Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!…

Read More

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Panelists to discuss the modern CSO at SECURITY 500 Conference

Panelists to discuss the modern CSO at SECURITY 500 Conference

Panelists to discuss the modern CSO at SECURITY 500 Conference | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Leaders chat security in times of permacrisis at SECURITY 500 Conference

Leaders chat security in times of permacrisis at SECURITY 500 Conference

Leaders chat security in times of permacrisis at SECURITY 500 Conference | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Addressing increased potential for insider threats with ChatGPT

Addressing increased potential for insider threats with ChatGPT

Addressing increased potential for insider threats with ChatGPT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 3 4 5 6 7 11