Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cyber security

Articles Tagged with ''cyber security''

Security News -- Cyber Security

ICE Seizes 70 More Counterfeit Websites

July 16, 2012

Bringing the total of seized sites to 839 in the past two years, the U.S. Immigrations and Customs Enforcement agency has seized 70 more sites selling counterfeit or illegal goods.


Read More
Cyber Security -- Hacking

453,000 Yahoo Voice Passwords Leaked

July 12, 2012

The hacking group responsible for the leak calls it a wake-up call, not a threat against Yahoo. 


Read More
Security News -- Cyber Security

Cyber Chief Warns of Rising Danger

July 10, 2012

General Keith Alexander warns that the nature of cyber attacks is changing from disruptive for destructive, and it could take a huge toll on American businesses.


Read More
Security News -- Cloud Computing

New European Guidelines to Address Cloud Computing

July 2, 2012

New guidelines, expected today from an E.U. panel on privacy, will give strong recommendations to European governments on whether to and how to adopt cloud computing. 


Read More
Cyber Security -- Regulations

Despite SEC Rule, Cybercrime Disclosures Rare

June 29, 2012

Although the Securities and Exchange Commission wants companies to inform investors of cybercrimes, very few companies comply with the request.


Read More

State of Alaska Fined $1.7 Million for Security Breach

June 28, 2012

In addition to paying the fine, the state's Department of Health and Social Services has agreed to improve its security practices.


Read More
Security News -- Cybersecurity

FBI Sting Leads to Arrest of 24 Alleged Cybercriminals

June 27, 2012

A two-year operation involving a fake website for hackers culminated in the arrest of 24 people across the globe.


Read More
Security News -- Cybersecurity

Survey: 9 in 10 Are Positive on Cloud Computing

June 26, 2012

While the cloud is flying high, many IT professionals still have a few reservations about adopting the technology.


Read More
Security News -- Cybersecurity

Nine of Ten Websites Have Significant Security Vunerabilities

June 26, 2012

According to data from Trust Guard, 86.7 percent of payment card industry scans reveal serious vulnerabilities. 


Read More
Security News -- Cybersecurity

Security Should Focus on Cybercrime, not Antivirus: Report

June 18, 2012

The UK spends around $1B each year on cybersecurity, with only $15M on cyber law enforcement.


Read More
Previous 1 2 … 405 406 407 408 409 410 411 412 413 414 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing