Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cybersecurity

Articles Tagged with ''cybersecurity''

Disaster recovery and planning: implementing a service option

Disaster Recovery as a Service: What is it and do you need it?

Dennis Thankachan
Dennis Thankachan
March 15, 2021

Disaster recovery as a service can potentially save organizations money and resources while ensuring they’re prepared for an incident that could potentially put them out of business. But what is DraaS, how can it be implemented at your organization and what are the benefits?


Read More
Cybercriminals take a play from sales best practices

How cybercriminals use sales best practices in ransomware attacks

Marcus J. Carey
February 21, 2021

Just like every company in the business world, cybercriminals are looking to boost their sales. With ransomware, they’ve found a way to force victims to pay. And in their quest, cyber attackers are borrowing a playbook from sales teams in legitimate businesses.


Read More
State of Indiana launches cybersecurity blog

Indiana launches cyber blog to promote cybersecurity best practices

February 17, 2021

The state of Indiana has announced the creation of its new Indiana Cyber Blog on its Cybersecurity Hub website, which aims to further promote best cybersecurity practices. 


Read More
Cryptocurrency theft was $1.9 billion in 2020

$1.9B in crypto currency stolen by hackers last year

February 17, 2021

According to data presented by Finaria.it, crypto criminals stole $1.9B in 2020, down from $4.5B in 2019.


Read More
3/4 of americans have had to change passwords due to data breaches

3/4 of Americans have had to change password due to security breach

January 27, 2021
In advance of National Data Privacy Day this week, a new survey finds that 3/4 of respondents have had to change their password due to a security or data breach.
Read More
Cyber warfare is the biggest threat to the enterprise

Executives believe cyber warfare is most dangerous threat to the enterprise

December 17, 2020

A new survey of technology executives found that most believe state-sponsored cyber warfare is the most dangerous threat to their enterprise.


Read More
New survey reveals insider threats more of a risk than external threat actors amid COVID-19 and race to work remotely

Cyber risks related to insider threats bigger than external threat actors

December 9, 2020

Findings from the 2020 Netwrix Cyber Threats Report reveal cybersecurity risks related to insiders are now more common than external threat actors.  Since organizations went remote, four of the top six types of cybersecurity incidents they experienced were caused by internal users.


Read More
mitigating risk with third party software

Hidden risks with third-party software and how to mitigate those risks

Gregory Rasner
Gregory Rasner
November 27, 2020

Third-party software can open your organization up to security risks. Learn how to ensure the third-party software at your organization is stable and secure.


Read More
Saint John New Brunswick hit by cyber attack

City of Saint John, New Brunswick hit by cyberattack

November 17, 2020
City of Saint John in New Brunswick, Canada is hit by significant cyberattack, causing it to shut down several IT systems.
Read More
Tired employees make data breach mistakes

Stressed employees behind 4 in 10 data breaches

November 13, 2020
A recent Outbound Email Security Report revealed that stressed, tired employees are behind four in 10 of the most severe data breach incidents. As stress levels rise, rushed employees are more likely to make simple mistakes such as sending an email to the wrong person, or attaching the wrong file.
Read More
Previous 1 2 … 12 13 14 15 16 17 18 19 20 … 103 104 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing