Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » research

Articles Tagged with ''research''

Navigating the Changing Weather
Special Report

The 2024 Annual Guarding Report: Navigating the Changing Weather

Security executives and guarding companies identify trends in security guarding throughout 2024, from political, climate-related challenges, violence, and theft.
Ed Finkel
December 5, 2024

Security executives and guarding companies identify trends in security guarding throughout 2024, from political, climate-related challenges, violence, and theft.


Read More
Padlock on laptop

SmokeLoader attack targets organizations in Taiwan

Jordyn Alger, Managing Editor, Security
Jordyn Alger
December 3, 2024

Research shows an observed attack deploying the SmokeLoader malware to target organizations in Tawian. 


Read More
Laptop in a dark room with coding on screen

Research uncovers the tool creating recent GitHub phishing attacks

Jordyn Alger, Managing Editor, Security
Jordyn Alger
November 13, 2024

Research has unveiled a tool responsible for many recent GitHub phishing attacks.


Read More
Coding on monitor

Global operation EMERALDWHALE steals 15K cloud credentials

Jordyn Alger, Managing Editor, Security
Jordyn Alger
October 31, 2024

A global operation called EMERALDWHALE has resulted in the theft of more than 15,000 cloud service credentials.


Read More
Red and black electronic chip

Research uncovers new attack method, security leaders share insights

Jordyn Alger, Managing Editor, Security
Jordyn Alger
October 22, 2024

Researchers at the University of Texas at Austin discovered a new attack method. 


Read More
Man in airport watching airplane take off

Malicious actors are leveraging peak travel and vacation times

Security Staff
August 28, 2024

As Labor Day approaches, new data warns that cybercriminals are exploiting increased traffic to cover their attacks. 


Read More
Dark laptop screen with neon coding

Top 5 ransomware groups and malware delivering ransomware in 2024

Security Staff
August 23, 2024

Research reveals the 5 most prominent ransomware groups and malware delivering ransomware. 


Read More
Man holding a mask

New research: Malicious actors are imitating tech companies

Security Staff
August 21, 2024

New research reveals that malicious actors are imitating tech companies in an effort to compromise corporate systems.


Read More
Authentication failed coding screen

Authentication bypass discovered in Microsoft Entra ID

Jordyn Alger, Managing Editor, Security
Jordyn Alger
August 21, 2024

Security leaders weigh in on a recently revealed authentication bypass in Microsoft Entra ID. 


Read More
Light blue connections

RansomHub threat actors observed using EDR-killing tool

Jordyn Alger, Managing Editor, Security
Jordyn Alger
August 20, 2024

Security leaders weigh in on a recent ransomware encounter deploying an EDR-killing tool. 


Read More
Previous 1 2 3 4 5 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing