Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » threat actor

Articles Tagged with ''threat actor''

multicolored html text on black screen

Research finds UEFI bootkit capable of bypassing security measures

Security Staff
March 2, 2023

New research shows that a unified extensive firmware interface (UEFI) bootkit is capable of bypassing security features despite system updates. 


Read More
blue screen with code and light blue lock in center

Thirty-one percent of former employees still have company SaaS access

Security Staff
March 1, 2023

SaaS report quantifies the volume, types and exposure risk of business assets stored within the SaaS estates of medium and large companies. 


Read More
Hacker can't enter system

Reducing dwell time of threat actors requires a reactive workforce

Julian Zottl
February 21, 2023

Organizations need to be properly equipped to respond as quickly as possible to reduce how long an attacker has access to sensitive data.


Read More
multicolored text on computer screen

Industrial wireless IoT present risks to operational technology

Security Staff
February 14, 2023

Research on the risks of industrial wireless IoT was released finding that they can provide a path to internal operational technology (OT) networks.


Read More
overhead football stadium

Event cybersecurity at the Super Bowl

February 10, 2023

Mass events like the Super Bowl can become targets for cyberattacks. Security leaders need to plan ahead to keep entertainment, staff and guests safe.


Read More
half open laptop on desk

Ransomware attacks took slight dip in 2022

Security Staff
February 9, 2023

The NCC Group's 2022 Annual Threat Monitor Report found that there were slightly less attacks than 2021 with a 5% decrease in ransomware activity. 


Read More
laptop with warning label

269 observed ransomware attacks globally in December 2022

Security Staff
January 25, 2023

The latest Threat Pulse research report examines ransomware attacks during the last month of the year and showed a surge in ransomware activity.


Read More
ransomware on laptop

Ransomware attacks nearly doubled in 2021

February 28, 2022

The 2021 Annual Threat Monitor from NCC Group catalogues and analyzes major cybersecurity incidents that occurred in the past year, including ransomware, data breaches and nation-state cyberattacks.


Read More
Lessons learned COVID-19 from a CISO for a CSO

Lessons learned: Six COVID-19 takeaways for CISOs from a CISO

Chris Jacquet
Chris Jacquet
January 25, 2021

The CoVID-19 pandemic is a gold-mine for lessons learned when it comes to security and cybersecurity at the enterprise level. Listen to Chris Jacquet, CISO at Hatachi Vantara, talk about the lessons he’s learned to keep his enterprise safer.


Read More
SolarWinds Orion current cybersecurity breach

CISA calls on public and private agencies to shutdown use of SolarWinds Orion products due to active security breach

December 14, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) issued an Emergency Directive 21-01, in response to a known compromise involving SolarWinds Orion products that are currently being exploited by malicious actors.


Read More
Previous 1 2 3 4 5 6 7 8 9 10 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing