Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » News

News
News RSS Feed RSS

half open laptop with colorful screen

88% of organizations use passwords as primary authentication method

Security Staff
January 23, 2024

According to a recent password report by Specops Software, passwords remain the primary authentication method for 88% of organizations.


Read More
kenny-eliason-JXg7Yq5b1wE-unsplash.jpg

The 2 am call: Preparing for a government cyberattack

Tracey Murdock
January 23, 2024

Fremont County suffered a cyberattack in 2022 that took pieces of the county's law enforcement's systems offline, including communications.


Read More
colorful text on black screen

Cyberattack attempts increased 104% in 2023

Security Staff
January 22, 2024

According to a recent cybersecurity report by Armis, geopolitical issues are affecting the cybersecurity landscape, including increased cyberattacks.


Read More
Top security conferences header

Top security conferences in 2024

Taelor Sutherland, Associate Editor
Taelor Sutherland
January 22, 2024

Security magazine brings you a list of the top physical security conferences to attend globally in 2024, including government and private events.


Read More
phone open to home screen

FTC bans Texas media company from sharing location data

Security Staff
January 19, 2024

The Federal Trade Commission (FTC) has banned Texas company InMarket Media from selling precise location data for advertising purposes.


Read More
Person working on thick laptop

49% of organizations cite poor training as cause for privacy concerns

Security Staff
January 18, 2024

According to a recent data privacy report, 43% say their privacy budget is underfunded and 51% of respondents expect a decrease in budget.


Read More
School sign with pencil that says love to learn

Utah state legislature adopts gun detection technology statewide

Security Staff
January 18, 2024

The Utah State Board of Education has announced additional security measures for public K-12 schools, including gun detection software statewide.


Read More
person stressed at laptop

68% of IT workers feel overwhelmed with data access restrictions

Security Staff
January 16, 2024

A report found that 68% of IT workers feel overwhelmed by the number of technical resources that are required to access the data they need to work.


Read More
people working at wooden table

Cyber incidents ranked most important risk globally

Security Staff
January 16, 2024

According to the Allianz Risk Barometer, cyber incidents (ransomware, data breaches and IT disruptions) are the top global concern of 2024.


Read More
plane taking off during daytime

TSA trained 5,000 crew members in self-defense in 2023

Security Staff
January 15, 2024

In 2023, the Transportation Security Administration (TSA) made a number of security improvements to improve passenger and employee safety.


Read More
Previous 1 2 … 90 91 92 93 94 95 96 97 98 … 899 900 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing