Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cyber attack

Articles Tagged with ''cyber attack''

hacker-in-hoodie.jpg

Understanding how hackers find their way in application supply chain

Uris-headshot
Uri Dorot
August 22, 2023

The application supply chain represents one of the latest and most serious vulnerabilities that hackers are targeting.


Read More
cyber attack

CISA posts remote monitoring & management systems cyber defense plan

Security Staff
August 17, 2023

A new plan published by CISA through JCDC provides a roadmap to address systemic risks by advancing security and resilience of the RMM ecosystem.


Read More
hacker-in-hoodie.jpg

Understanding the impact of cyberattacks on small businesses

Mike Szczesny
Mike Szczesny
August 14, 2023

Unlike large corporations with robust security measures and infrastructure, many small and medium-sized businesses lack such resources, making them prime targets for online attacks.


Read More
Working Remotely
Global News

Ensuring data privacy while working remotely

Taelor Sutherland, Associate Editor
Taelor Sutherland
August 9, 2023

Protecting the personal information of remote executives.


Read More
Women walking on campus

Study: Higher education leaders see security as top priority

Security Staff
August 8, 2023

A new study found that top institutional leaders are increasingly focused on improving both physical and network security.


Read More
globe

Report: US suffers 49.8M leaked accounts in Q2

August 7, 2023

A recent report shows the United States was the most breached country in Q2 of this year.


Read More
criminal-on-laptop.jpg

On average shareholder value drops 9% year after major cyber incident

Security Staff
August 4, 2023

A recent report reveals on average, a major cyber incident resulted in a 9 percent decrease in shareholder value in the year following the event. 


Read More
laptop keyboard and cellphone next to plant

Report: 97% of executives access work accounts on personal devices

Security Staff
August 4, 2023

The majority of executives are using their personal devices for work, creating a “backdoor” for cyber criminals to access large enterprise organizations.


Read More
artificial intelligence AI graphic
Cybersecurity Education & Training

Assessing the pros and cons of AI for cybersecurity

Charles Denyer Headshot
Charles Denyer
August 1, 2023

Artificial intelligence (AI) has significant implications for cybersecurity, both in terms of enhancing cybersecurity defenses and creating new challenges and risks.


Read More
code on computer screen

Report reveals new information about Akira Group connection to Conti

Security Staff
July 27, 2023

New research dives into the Akira ransomware group, including the group’s recent victim focuses, tactics and affiliation with Conti.


Read More
Previous 1 2 3 4 5 6 7 8 9 … 41 42 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing