Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cyber security

Articles Tagged with ''cyber security''

Russia and Cyberattacks

NSA: Sandworm Actors Exploiting Vulnerability in Exim Mail Transfer Agent

May 29, 2020
Russian cyber actors from the GRU Main Center for Special Technologies (GTsST), field post number 74455, have been exploiting a vulnerability in Exim Mail Transfer Agent (MTA) software since at least August 2019, warns a new National Security Agency (NSA) cybersecurity advisory.
Read More
christopher davis

Christopher Davis Named Chief Information Officer at Mspark

May 29, 2020
Mspark, a national shared mail company, has named Christopher Davis as Chief Information Officer.
Read More
SEC0520-cyber-Feat-slide1_900px

VivaVideo, “Spyware” App Maker, Contains Remote Access Trojan and Requests Dangerous App Permissions

May 29, 2020
VivaVideo, Chinese "spyware" app with at east 100 million installs on the Android Play Store, is requesting dangerous permissions, including the ability to read and write files to external drives and an user's specific GPS location.
Read More
SEC0819-Cyber-Feat-slide1_900px

Securing the Mainframe: How Companies can Empower Security Analysts to Protect the Backbone of Their Enterprise

Christopher Perry
May 29, 2020
To apply true holistic security best practices and reduce significant risks to the mainframe, security teams must embrace an integrated mainframe security strategy.
Read More
UTSA

Department of Energy Picks UTSA for $111 Million Cybersecurity Institute

May 29, 2020

The University of Texas-San Antonio has been selected to receive a five-year, $70 million cooperative agreement from the U.S. Department of Energy to establish and lead the Cybersecurity Manufacturing Innovation Institute (CyManII).


Read More
RSA 2020

RSA Conference 2021 Moves to May

May 29, 2020

RSA Conference announced that RSA Conference 2021 will now take place the week of May 17 instead of in February as previously planned. 


Read More
laura money

Laura Money Named Executive Vice President & Chief Information Officer at Sun Life Financial

May 28, 2020
Sun Life Financial Inc. has announced the appointment of Laura Money as Executive Vice-President and Chief Information Officer.
Read More
Cybersecurity Leadership Images

ISACA Enhances CSX Cybersecurity Practitioner Certification to Test 20 Cybersecurity Skills

May 28, 2020
ISACA has updated its performance CSX Cybersecurity Practitioner (CSX-P) certification with expanded job tasks that span and test across five key security functions – Identify, Protect, Detect, Respond, and Recover.
Read More
keys-cyber-enews

GAO: Federal Agencies Need to Coordinate on Requirements and Assessments of States

May 28, 2020
The US Government Accountability Office reviewed four federal agencies and found that they did not have policies for coordinating assessments with states and none of them had policies for coordinating assessments with each other.
Read More
sectigo

“Evolution of IoT Attacks” Study Exposes the Arms Race Between Cybercriminals and Cybersecurity

May 28, 2020
The number of devices connected to the internet is expected to reach 50 billion worldwide by the end of 2030, posing dangerous risks to people, businesses and critical systems.
Read More
Previous 1 2 … 257 258 259 260 261 262 263 264 265 … 413 414 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Man silhouette

Former UK Ambassador, Linked to Epstein, Failed Security Vetting Yet Received Clearance

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing