Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cybersecurity

Articles Tagged with ''cybersecurity''

the cloud

Encryption and Authentication: The One-Two Punch That Protects Your Data

Jake Kiser
Jake Kiser
July 2, 2019
While cybersecurity should be a primary concern for all organizations, there is no one-size-fits-all approach. Mid-market businesses have different security needs and concerns than large enterprises. To meet these needs, CISOs must meet with business leaders to discuss what technology is required to safeguard digital assets. Cloud adoption only heightens the need for this conversation.
Read More
global

What is New (and What Isn’t) in Business Continuity Planning Pt.2

Kevin Alvero
Kevin Alvero
Wade Cassels
Wade Cassels
July 2, 2019
According to the Disaster Recovery Institute (DRI), the actual scope of work of a BC or resilience professional hasn’t really changed. Organizations still must have high-quality response and damage limitation plans formulated by skilled planners. The change in the resilience profession, however, is moving away from a technical specialization and into mainstream business risk management. DRI reports that consolidation of resilience disciplines has increased over the past year. The main result of this is that fewer organizations have independent business continuity departments, with BC professionals being incorporated into existing risk management or information security divisions.
Read More
Strong Cybersecurity: The Critical Role of Lifecycle Management - Security Magazine

Social Security Administration Wants to Improve Cybersecurity

July 2, 2019

The Social Security Administration (SSA) is looking to boost their cybersecurity practices and prevent data breaches. 


Read More
AI-enews

Voting Machines Are Not Safe, Cybersecurity Experts Say

July 2, 2019

The use of AI assistants, social media, public wi-fi, and more – are leaving identity and privacy in a state of critical risk and U.S. elections and critical infrastructure compromises may be at risk. 


Read More
SEC0719-Edu-Feat-slide1_900px

A New Framework for Preventing Cyber Attacks

Dr. Zahid Anwar
July 1, 2019

The scale of data theft is staggering. In 2018, data breaches compromised 450 million records, while 2019 has already uncovered the biggest data breach in history, with nearly 773 million passwords and email addresses stolen from thousands of sources and uploaded to one database.


Read More
cybersecurity

Five Reasons SMBs Are Starting to Pay Attention to Cybersecurity

harold kilpatrick
Harold Kilpatrick
June 28, 2019

In today’s world, an increasing number of transactions are executed online. To do so successfully, storing sensitive personal data such as credit card numbers is a necessity


Read More
How New York is Shaking Up Cybersecurity

SHIELD Act Strengthens Data Breach Policies in NY

June 27, 2019

The Stop Hacks and Improve Electronic Data Security Act, or SHIELD Act, was recently passed by the New York legislature. It updates the state’s breach notification laws and broadens the definition of what constitutes a "breach". 


Read More
Outsourcing Data: Don't Take a Fairytale Approach

News Industry At Risk of Data Breaches, Data Misuse

June 27, 2019

News industry websites are at a higher risk of user-data breach or data misuse compared to other industries, the 2019 Feroot User Security and Privacy report found. 


Read More
ransomware

Ransomware Attacks: Strategies to Recover and Prevent Them

schachar shamir
Schachar Shamir
June 27, 2019

Chances are you’ve been warned never to download files or click on links from unknown senders. 


Read More

Federal Agencies’ Cybersecurity Failures Leaving Americans’ Personal Information at Risk

June 26, 2019

U.S. Senators Rob Portman (R-OH) and Tom Carper (D-DE) published a report that documents the failure of eight federal agencies, over the course of two administrations, to address vulnerabilities in their IT infrastructure.


Read More
Previous 1 2 … 81 82 83 84 85 86 87 88 89 … 103 104 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing