Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cyber security

Articles Tagged with ''cyber security''

SEC0719-Privacy-Feat-slide1_900px

DoJ Says Ex-Twitter Employees Acted as Agents for Saudi Arabia, Violated Twitter Users' Privacy

November 8, 2019
Ali Alzabarah, Ahmad Abouammo, and Ahmed Almutairi, aka Ahmed Aljbreen, were charged for their respective roles in accessing private information in the accounts of certain Twitter users and providing that information to officials of the Kingdom of Saudi Arabia.
Read More

Aventura Technologies and Senior Management Charged with Fraud, Money Laundering and Illegal Importation of Equipment Manufactured in China

November 8, 2019

A criminal complaint was unsealed in a Brooklyn federal court charging Aventura Technologies, a New York-based surveillance and security equipment company, and seven current and former employees, with selling Chinese-made equipment with known cyber security vulnerability to government and private customers, while claiming the equipment was made in the U.S.


Read More
digital-cyber

Orchestrating Cybersecurity Across the Business Ecosystem

A cyber leader’s guide to learning the business and providing precise support.
matthew doan
Matthew Doan
November 7, 2019
Increasing a business’ digital competence is a need that’ll never go away; continual transformation is required to be competitive in the market. So much hinges on getting digital right that entire new disciplines and executive roles are springing up, including the Chief Digital Officer and Chief Transformation Officer. Change makes many people uncomfortable, but it’s a necessity.
Read More
c-suite

How to Increase Collaboration Between IT and Executive Leadership Teams

christopher gerg
Christopher Gerg
November 7, 2019

For enterprises to implement cloud technology successfully, the C-Suite and IT teams need to work closely to coordinate and deliver a wide range of as-a-service technical offerings. How can enterprises increase the relationship between the board and tech teams and help to develop a prosperous, collaborative partnership?


Read More
cyber network

Cybersecurity: A View From the Middle

gilbert morales
Gilbert Morales
November 7, 2019
Cybersecurity can be a scary beast for any organization of any size. The stakes are high. The adversaries are sly. The landscape is always shifting.These challenges can be especially significant for small and medium-sized businesses that have limited resources in capital and specialized expertise.
Read More
Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

Research Center's Failure to Encrypt Mobile Devices Leads to $3 Million HIPAA Settlement

November 7, 2019
The University of Rochester Medical Center has agreed to pay $3 million to the Office for Civil Rights at the U.S. Department of Health and Human Services for the data breaches it suffered during 2013-2017. 
Read More
Voting2

Election Security Is Top Priority for U.S. Government, Officials Say

November 7, 2019
Federal agencies and government officials have released a joint statement affirming that election security is a top priority for the U.S. Government.
Read More
cyber7-900px.jpg

Fraud Attacks Increase 30% in Q3 2019

November 7, 2019

Fraud increased 30 percent overall in Q3 2019 and bot-driven account registration fraud is up 70 percent as cybercriminals test stolen credentials in advance of the holiday retail season.


Read More
SEC1119-awareness-Feat-slide1_900px

Defending Against Ransomware: The Growth of Targeted Attacks

Ransomware attacks are getting bolder and affect enterprises of all sizes.
anthony giandomenico
Anthony Giandomenico
November 7, 2019

Cybercriminals are moving away from mass-volume, opportunistic ransomware attacks. Instead, they are focusing on enterprises they believe will pay their ransoms. What are some security best practices to protect against ransomware?


Read More
cyber5-900px.jpg

Cybersecurity Workforce Needs to Grow 145% to Close Skills Gap

November 6, 2019

A new study from ISC² estimates the current cybersecurity workforce at 2.8 million professionals and estimates that 4.07 professionals will be needed to close the skills gap (4.07 million professionals).


Read More
Previous 1 2 … 315 316 317 318 319 320 321 322 323 … 413 414 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing