This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » digital security

Articles Tagged with ''digital security''

cyber-person

4iQ Report: The Era of Weaponized Data Breaches

May 7, 2020
The number of new identity records and the depth of personal information available in exfiltrated data are expanding, creating a blueprint of digital identities that threat actors can weaponize and expose identity information.
Read More
RSA 2017: The "Culture" of Cybersecurity Collaboration

CISA Issues Alert on North Korean Cybersecurity Threat

April 17, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) issued an alert to the international community, network defenders and the public of the North Korean cyber threat.
Read More
bryan jones

Bryan Jones Named Chief Technology Officer at the Office of Experience

April 17, 2020
The Office of Experience (OX), a Chicago, Ill.-based design and digital innovation agency, announced that it has named Bryan Jones as Chief Technology Officer. Jones comes to OX most recently from the Marketing Store, where he served as Global Chief Technology Officer delivering product solutions for McDonalds, Nissan and T-Mobile.
Read More
SEC1019-cyber-Feat-slide1_900px

Information Security Forum: Nine Cybersecurity Threats Organizations can Expect Through 2022

April 16, 2020
The Information Security Forum (ISF), a London-based authority on cybersecurity, information security and risk management has released Threat Horizon 2022, which highlights nine major threats, broken down into three themes, that organizations can expect to face over the next two years as a result of increasing developments in technology. 
Read More
Video surveillance analytics

Survey Shows Public Transport is Getting Smarter and Safer

April 16, 2020
A new survey found that with increased digitalization, public transport is getting smarter and safer than ever. According to the research report, 82 percent of respondents have shifted to digital or hybrid video systems, as compared with 73 percent in 2015. Digitalization of the technology is improving the overall security, leading to an increase in safety and happiness among passengers and staff.
Read More
digital-cyber

New Report: Uncovering the Likeness & Disparities in Today’s Digital Age between Seniors & Millennials

March 30, 2020

Seniors and millennials may be more alike than many believe - they are both connecting to a similar number of Internet of Things devices (at least 7 Wi-Fi devices) and both engaging in similar, risky online behaviors, reveals a new Generali Global Assistance and the Identity Theft Resource Center study. 


Read More
SEC0719-Privacy-Feat-slide1_900px

The Case for a Federal Digital Privacy Strike Force

Stuart N. Brotman
March 27, 2020
In late January, the Department of Justice filed lawsuits seeking temporary restraining orders against five companies and three individuals, based on allegations that they had carried hundreds of millions of fraudulent robocalls to American consumers. Within days, the Federal Trade Commission (FTC) sent letters to 19 Voice over Internet Protocol providers to warn them that any assistance or facilitation of telemarketing through robocalls would be deemed to violate the new law.
Read More
SEC0919-Mobile-Feat-slide1_900px

Can the Tsunami of Phone-Based Social Engineering be Contained?

As soft target telephone scams become more sophisticated, people are turning to protocols like biometric verification for enhanced protection. But implementation is key.
aman khanna
Aman Khanna
March 17, 2020
As digital security through online portals continually improves and people become more wary of phishing emails, hackers have turned to old fashioned telephone calls to elicit key pieces of personal information they can use for profit. It takes little technical skill—just the ability to sound convincing to vulnerable people over the phone.
Read More
Gaps in Cybersecurity Programs

60% of Enterprises Not Equipped to Respond to Data Breaches

February 11, 2020
Most organizations (73 percent) surveyed in a research continue to experience unplanned downtime and outages due to mismanaged digital certificates. 
Read More
city1-900px.jpg

World's Safest City to Visit is Revealed by Economist Intelligence Unit

August 29, 2019
The Economist Intelligence Unit's 2019 Safe Cities Index (SCI) has ranked 60 destinations across the world in terms of their digital security, health security, infrastructure and personal safety.

Read More
Previous 1 2 3 4 5 6 7 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

Popular Stories

Security's Most Influential People in Security 2023

Security's Most Influential People in Security 2023

Ava Cooper-Davis Global and U.S. Chief Security Officer Deloitte

Ava Cooper-Davis | Most Influential People in Security 2023

open computer with green vertical text

Amerita and PharMerica announce data breach

person using laptop next to stethoscope

Nuance Communications announces data breach affecting healthcare

vertical white lines on dark screen

CISA and FBI release joint cybersecurity advisory

SEC Exterro webinar

SEC Axis Communications webinar

Most Influential People in Security 2023

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Average Security Professionals Salary

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing