Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cyber security

Articles Tagged with ''cyber security''

UPS Reports Security Breach

August 20, 2014

UPS Stores, a subsidiary of UPS, said o that a security breach may have led to the theft of customer credit and debit data at 51 UPS franchises in the US.


Read More

Albertson's Stores Hacked For Credit and Debit Cards

August 16, 2014

Hackers have broken into the credit and debit card payment networks at supermarket chains Albertson's and SuperValu.


Read More

More Than 575 Million U.S. Payment Cards to Feature Chip Security in 2015

August 14, 2014

 Nine of the country’s largest payment card issuers who participate in the Payments Security task force estimate that they will have issued more than 575 million chip-enabled payment cards by the end of 2015. 


Read More

Are BYOD Threats Overblown?

August 6, 2014

BYOD threats are among the top security concerns for CSOs and CIOs.


Read More

Cisco Midyear Security Report Highlights Weak Links in Dynamic Threat Landscape

August 5, 2014

The Cisco 2014 Midyear Security Report, released at Black Hat U.S. examines the “weak links” in organizations that contribute to the increasingly dynamic threat landscape.


Read More

U.S. House Passes Three Cybersecurity Bills

July 31, 2014

 The U.S. House of Representatives passed three cybersecurity bills aimed at strengthening the federal government’s ability to prevent and respond to cyberattacks. 


Read More

Georgia Tech Launches Early Warning System for Cyberthreats

July 29, 2014

Georgia Institute of Technology's applied research arm has launched an early warning system to help organizations prepare for possible cyberattacks.


Read More

Florida Enacts Information Protection Act

July 2, 2014

Florida has enacted an Information Protection Act that aims to ward off identity theft by requiring organizations to protect personal data and report data breaches in a shorter period. 


Read More

95% of Successful Security Attacks are the Result of Human Error

June 19, 2014

According to security researchers at IBM and the Cyber Security Intelligence Index, 95 percent of successful hack attacks or incidents were because of some type of human error.


Read More

Survey says Shortage Of Cybersecurity Professionals Poses Risk To National Security

June 19, 2014

The nationwide shortage of cybersecurity professionals – particularly for positions within the federal government – creates risks for national and homeland security, according to a new study from the RAND Corporation.


Read More
Previous 1 2 … 385 386 387 388 389 390 391 392 393 … 413 414 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing