About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

CyberArk Launches Essential New Companion Guide: “The Identity Security Imperative”

Visionary publication helps cybersecurity leaders master identity security in the cloud-first, AI-first era

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced the release of a new book, “The Identity Security Imperative: A Leader’s Guide to Securing Every Identity.” It challenges today’s cybersecurity leaders to rethink and redefine their security strategies, offering an in-depth, practical roadmap for safeguarding identities across increasingly complex digital landscapes.

In a world where 93 percent* of organizations have been the victim of two or more identity-related breaches, identity security has become one of the most critical components of a comprehensive cybersecurity strategy. The guide distills complex identity frameworks into a cohesive, actionable plan that simplifies strategy implementation to protect enterprises from current and emerging identity security threats, including those associated with Agentic AI.

Authored and consulted by leading experts, The Identity Security Imperative includes essential insight on the following key areas:

  • Reimagining Identity Security: A deep dive into modern identity security, including how it fits into enterprise security programs and the critical capabilities required to mitigate risk and increase resiliency.
  • Managing Role-based Risk: How to manage identity security across identity lifecycles and apply appropriate security controls based on the risks associated with each identity type.
  • Deploying Scalable Best Practices: How to implement and scale an identity security program tailored to the needs of organizations, including enabling zero trust, addressing standard frameworks, regulations and insurance requirements, and successful use cases.
  • Adversary Innovation, Quantum and Future Threats: Strategies for securing and defending against AI, considerations for large language models (LLM) and Agentic AI implementation, plus advice on preparing for quantum computing.

“From zero-trust architectures to automation to intelligent privilege controls, this book will redefine how you think about identity security and help you gain better control of risks in complex environments,” said Kirsten Davies, Founder, Institute for Cyber and former CISO, Unilever.

“We created this book as an indispensable guide for everyone who is invested in cybersecurity and committed to building a secure digital future,” said Matt Cohen, CEO at CyberArk. “Identity security is the foundation of business resilience. This book lays out a clear path to securing identities today and preparing leaders to stay ahead of tomorrow’s challenges by integrating and reimagining identity security at every level of business operations and for every identity type – human or machine.”

Available to read now online and coming soon in ebook and audio formats, “The Identity Security Imperative” is a Security Matters publication by CyberArk. To obtain a complimentary copy, click here.

*Source: CyberArk 2024 Identity Security Threat Landscape Report

About Security Matters

Security Matters is CyberArk’s thought leadership platform, dedicated to empowering security leaders and line of business professionals with the knowledge and insights needed to navigate the complex world of digital threats. With a security-first mindset, our content is curated to provide credible and timely information from those on the frontlines – because how you approach security matters.

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in identity security, trusted by organizations around the world to secure human and machine identities in the modern enterprise. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can minimize operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource, located anywhere, from everywhere. Learn more at cyberark.com.

Copyright © 2025 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.