Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » data security

Articles Tagged with ''data security''

'Kill Switch' Standard on U.S. Phones in 2015

April 16, 2014

The "kill switch," a system for remotely disabling smartphones and wiping their data, will become standard in 2015.


Read More

Federal Energy Regulators "Scrubbing All Databases" to Protect Power Grid

April 11, 2014

After several officials let slip some sensitive documents revealing specific physical threats to the U.S. power grid, the Federal Energy Regulatory Commission is taking steps to clamp down on the flow of information out of the organization. 


Read More

Judge Rules FTC can Sue Wyndham over Cyber Security Lapses

April 8, 2014

A federal judge ruled that the U.S. Federal Trade Commission can sue hotel group Wyndham Worldwide over alleged poor data security.


Read More

US States Probing Security Breach at Experian

April 5, 2014

A number of U.S. states are jointly investigating a data breach involving a subsidiary of Experian Plc that exposed the social security numbers of 200 million people.


Read More

US Financial Council Warns Banks about Rise in Cyber-Attacks

April 2, 2014

The Federal Financial Institutions Examination Council (FFIEC) warned banks about rising cyber-attacks on their websites and their cash machines.


Read More

Testing Wireless Security Awareness at RSA

In February, a crowd of cybersecurity professionals attended the RSA Conference in San Francisco.
April 1, 2014

Kent Lawson, founder of Private WiFi, decided to test the wireless network provided at the RSA Conference, and he was surprised at the large amount of completely unprotected communications from security professionals, discovered in a mere 15 minutes.


Read More

Consumers Say Organizations Don’t Care About Protecting Their Data

March 11, 2014

Most consumers just don’t believe that the personal and financial data they submit to corporations is safe.


Read More

McAfee Reports 200 New Computer Attacks Per Minute in 2013

March 11, 2014

A new report from McAfee says every minute there are more than 200 new computer attacks using a variety of malware.


Read More

Changing the Definition of Surveillance in the Age of Converged Risk

Surveillance deals with the act of carefully watching someone or something with the specific intent to prevent or detect a crime.
Bob Liscouski
March 1, 2014

The role of the CSO has significantly changed in the past 10 years and will change even more drastically over the next 10. For example, mention “convergence” and lines begin to blur – lines demarcating previously clear-cut, albeit traditional areas of management responsibility, budgets, reporting hierarchies, resourcing needs and geography.


Read More

US Attorney General Urges Congressional Action for Data Breach Notifications

February 24, 2014

Attorney General Eric Holder is urging Congress to require businesses to quickly alert consumers and law enforcement agencies in the wake of a significant data breach, similar to the ones at Target and Neiman Marcus.


Read More
Previous 1 2 … 32 33 34 35 36 37 38 39 40 41 42 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Classroom with desks and chairs

School’s Out, But Security’s Not: Preparing for K-12 Summertime Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing