Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cybersecurity

Articles Tagged with ''cybersecurity''

Aventura Technologies and Senior Management Charged with Fraud, Money Laundering and Illegal Importation of Equipment Manufactured in China

November 8, 2019

A criminal complaint was unsealed in a Brooklyn federal court charging Aventura Technologies, a New York-based surveillance and security equipment company, and seven current and former employees, with selling Chinese-made equipment with known cyber security vulnerability to government and private customers, while claiming the equipment was made in the U.S.


Read More
digital-cyber

Orchestrating Cybersecurity Across the Business Ecosystem

A cyber leader’s guide to learning the business and providing precise support.
matthew doan
Matthew Doan
November 7, 2019
Increasing a business’ digital competence is a need that’ll never go away; continual transformation is required to be competitive in the market. So much hinges on getting digital right that entire new disciplines and executive roles are springing up, including the Chief Digital Officer and Chief Transformation Officer. Change makes many people uncomfortable, but it’s a necessity.
Read More
c-suite

How to Increase Collaboration Between IT and Executive Leadership Teams

christopher gerg
Christopher Gerg
November 7, 2019

For enterprises to implement cloud technology successfully, the C-Suite and IT teams need to work closely to coordinate and deliver a wide range of as-a-service technical offerings. How can enterprises increase the relationship between the board and tech teams and help to develop a prosperous, collaborative partnership?


Read More
Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

Research Center's Failure to Encrypt Mobile Devices Leads to $3 Million HIPAA Settlement

November 7, 2019
The University of Rochester Medical Center has agreed to pay $3 million to the Office for Civil Rights at the U.S. Department of Health and Human Services for the data breaches it suffered during 2013-2017. 
Read More
Voting2

Election Security Is Top Priority for U.S. Government, Officials Say

November 7, 2019
Federal agencies and government officials have released a joint statement affirming that election security is a top priority for the U.S. Government.
Read More
cyber7-900px.jpg

Fraud Attacks Increase 30% in Q3 2019

November 7, 2019

Fraud increased 30 percent overall in Q3 2019 and bot-driven account registration fraud is up 70 percent as cybercriminals test stolen credentials in advance of the holiday retail season.


Read More
SEC1119-awareness-Feat-slide1_900px

Defending Against Ransomware: The Growth of Targeted Attacks

Ransomware attacks are getting bolder and affect enterprises of all sizes.
anthony giandomenico
Anthony Giandomenico
November 7, 2019

Cybercriminals are moving away from mass-volume, opportunistic ransomware attacks. Instead, they are focusing on enterprises they believe will pay their ransoms. What are some security best practices to protect against ransomware?


Read More
cyber5-900px.jpg

Cybersecurity Workforce Needs to Grow 145% to Close Skills Gap

November 6, 2019

A new study from ISC² estimates the current cybersecurity workforce at 2.8 million professionals and estimates that 4.07 professionals will be needed to close the skills gap (4.07 million professionals).


Read More

ISC East Keynote Speakers Announced

November 5, 2019
Security and public safety leaders Deanne Criswell, commissioner of the New York City Emergency Management Department, and Angela Stubblefield, deputy associate administrator for security and hazardoues materials safety at the Federal Aviation Administration (FAA), will headline the 2019 SIA Education@ISC East Keynote Series.
Read More
cyber threat

AsusWRT and Amazon Alexa Products Compromised in Data Breach

November 5, 2019

AsusWRT, a web-based app from Asus that allows users to manage their WiFi network and works with smart devices, such as Amazon Alexa products, has been compromised in a data breach, giving hackers access to an user's home network and the ability to hijack smart devices.


Read More
Previous 1 2 … 54 55 56 57 58 59 60 61 62 … 103 104 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing