Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cyber attack

Articles Tagged with ''cyber attack''

factory

Challenges in smart factory and manufacturing cybersecurity

Security Staff
July 7, 2022

Manufacturing security leaders are faced with cybersecurity challenges such as a lack of C-suite buy-in, limited budget and vulnerabilities, according to a Capgemini report.


Read More
qr code

QR code phishing scams target users and enterprise organizations

Rob Corso
July 7, 2022

QR codes have become ubiquitous, but cybercriminals are using them to target phishing victims.


Read More
cyber security

6 enterprise data breach and cybersecurity defenses

Richard Barretto
July 1, 2022

Lost files and records may cost more than you think. From encryption to insider threats, review these cyber defense tactics to protect against data breaches.


Read More
artificial intelligence

Does AI materially impact cybersecurity strategies?

Dustin-Hillard
Dustin Hillard
June 29, 2022

Despite the appeal of stories that pitch artificial intelligence (AI) cyberattacks versus AI cyber defense, the reality is that humans are still at the heart of any complicated cyberattack and cybersecurity efforts.


Read More
university campus

How to keep cybercriminals off university campuses

Rick McElroy
Rick McElroy
June 29, 2022

Cyberattacks have had drastic effects on universities and colleges, from the compromise of student and staff data to the permanent shuttering of higher ed institutions. Follow these five steps to bolster university cybersecurity posture.


Read More
cybersecurity

Ransomware in Q1 2022 doubled total 2021 volume

Security Staff
June 28, 2022

The WatchGuard Technologies Threat Lab Q1 2022 Internet Security Report detected more than double the volume of ransomware in the first quarter of 2022 compared to full year 2021.


Read More
work from home employee

Hybrid work transition reveals low enterprise cybersecurity confidence

Security Staff
June 28, 2022

The shift to hybrid and remote work rapidly increased enterprise attack surfaces. According to a survey from Oomnitza, 60% of cybersecurity leaders have low levels of confidence in their attack surface risk management.


Read More
cyber security executive

87% of executives have no cybersecurity tools on personal devices

Madeline Lauver
June 27, 2022

Business executives are targets of cyberattacks, and their personal devices represent possible attack vectors for cybercriminals. A report from BlackCloak discusses the state of C-suite device cybersecurity.




Read More
API security

It’s time to adopt modern API security

Tom Hickman
Tom Hickman
June 8, 2022

Application Programming Interfaces (APIs) are a top cyberattack vector, but legacy cybersecurity strategies don’t do enough to protect them from threats.


Read More
bot attack

Investigating the effects of bot cyberattacks

Security Staff
June 7, 2022

Bot attacks can negatively affect organizational cybersecurity and business revenue, according to the Bot Management Review 2022 from Netacea.


Read More
Previous 1 2 … 11 12 13 14 15 16 17 18 19 … 41 42 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing