Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » vulnerability

Articles Tagged with ''vulnerability''

cybersecurity-screen.jpg

Cyber hygiene: Building blocks to protect attack surfaces

Rob Gurzeev
April 24, 2023

Cyber breaches or ransomware-induced shutdowns can crush a company. But, cybersecurity hygiene can greatly limit exposure and prevent most breaches. 


Read More
Randsomware-on-Laptop.jpg

CISA starts ransomware vulnerability pilot program

Security Staff
March 20, 2023

CISA announces the Ransomware Vulnerability Warning Pilot to help determine vulnerabilities commonly associated with known ransomware exploitation.


Read More
Employee burnout

Bolstering defenses amid evolving threats & cyber pro burnout

Rick McElroy
Rick McElroy
February 2, 2023

Cybersecurity is a continuous effort because, as systems evolve, so do attackers; however, best practices can bolster cybersecurity posture.


Read More
cyber handshake

New opportunities at the intersection of physical and cybersecurity

Bud Broomhead
October 21, 2022

Now is the time to address needs at the intersection of physical and cybersecurity, leveraging internal coordination and having the proper tools to manage security.


Read More
software code

Vulnerability exploitation is top initial access vector for ransomware

Security Staff
October 10, 2022

The 2022 State of the Threat Report from Secureworks identified software vulnerabilities as the primary initial access vector for ransomware.



Read More
data breach warning

Data breach exposes records of 2.5 million student loan borrowers

Madeline Lauver
September 8, 2022

A data breach of Nelnet Servicing (Nelnet) affected over 2.5 million student loan borrowers from Edfinancial Services and the Oklahoma Student Loan Authority (OSLA).


Read More
employees

83% of cybersecurity teams affected by talent shortages

Madeline Lauver
April 18, 2022

Talent shortages have negative effects on cybersecurity, according to the State of Pentesting 2022 report from Cobalt. To avoid talent gaps, employers can focus on proactive retention.


Read More
software development

67% of app developers have shipped code with known vulnerabilities

Security Staff
April 11, 2022

Securing the software supply chain is a monumental task for cybersecurity leaders. A survey from Secure Code Warrior investigated how application developers view security in their work.


Read More
Data around the globe

Growing data privacy enforcement on the horizon

December 27, 2021

Data privacy leaders from the International Association of Privacy Professionals (IAPP) highlight what to expect in the field from increased privacy regulations to global data management practices.


Read More
The Cyber 101 Discussion

‘Vulnerable’ iOS Cut-and-Paste Data in iPhone or iPad Devices

March 2, 2020
Any cut-and-paste data temporarily stored to an iPhone or iPad’s memory can be accessed by all apps - malicious or not - installed on a device. 
Read More
Previous 1 2 3 4 5 6 7 8 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Man silhouette

Former UK Ambassador, Linked to Epstein, Failed Security Vetting Yet Received Clearance

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing