Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » data breach

Articles Tagged with ''data breach''

cyber-person

A Seismic Shift: What California’s New Privacy Law Means for Cybersecurity

John Adams
July 5, 2018
Like the GDPR before it, the CCPA is getting a lot of attention because of the rights California residents will have to access data held by companies, to have that data removed, and to prohibit the sale of personal data. The new law, which does not go into effect until 2020, also creates the potential for some eye-popping payments directly to consumers impacted by a breach.
Read More
cybercamera

Why Financial Services Must Adopt a Zero Trust Approach to Cybersecurity

Dan Panesar
July 5, 2018
The current approach to cybersecurity within the financial services industry is flawed. With regulations such as the new General Data Protection Regulation (GDPR) and New York State’s DFS Cybersecurity Regulation being enforced, putting ever greater pressure on data protection, combined with the fact that the financial services industry is one of the most targeted, regulatory and consumer eyes alike are firmly on financial institutions to improve their cybersecurity processes and models.
Read More

Board of Directors Interest in Cybersecurity Increases 23% Since 2017

June 12, 2018

Boards ramp up investment in data privacy and security in rush to become GDPR compliant and avoid data breaches, says a Harvey Nash/KPMG CIO Survey.


Read More
cloud-enews

How to Work with IT on Physical Security Decision-Making

Kim Loy
June 11, 2018
Increased risk doesn’t automatically mean an increase in an organization's security budget or preparedness plans.
Read More
ransom-enews

Financial Services in the Ransomware Crosshairs: Why and What to Do

Darius Goodall
June 11, 2018
Cybercriminals are leveraging ransomware threats to extort big money from organizations of all sizes in every industry, but financial services organizations are one of today’s primary targets. It is non-negotiable for financial services companies to maintain the privacy of theirs customers and the security of their confidential data. If a bank or credit union is hit with a ransomware attack, significant backlash is undoubtedly going to ensue – especially if customer data is held ransom for a significant amount of time.
Read More
Cybersecurity Leadership Images

Las Vegas Most Insecure Cyber City in US

May 30, 2018

A new study, Cybersecurity in the City: Ranking America's Most Insecure Metros, has identified Las Vegas, Memphis and Charlotte as America's most cyber insecure cities.


Read More
Cybersecurity passwords

Why People are 'Password Walking'

May 23, 2018

A recent study of 61 million leaked passwords from Virginia Tech and Dashlane uncovered troubling password patterns.


Read More
id2-900px.jpg

Equifax Says Passport Numbers Were Stolen

May 11, 2018

Equifax has said that passport images and information were stolen as part of last year’s security breach.


Read More
bigbrother-enews

Big Brother vs. Little Brother: Mapping Where Our Personal Information Goes

Erik Kleinsmith
May 8, 2018

More and more, the news is filled with stories about how personal information is being used to benefit others. From revelations after Mark Zuckerberg’s pseudo mea culpa in front of Congress last month, to stories about fake news, identity theft, and how data mining is being used by political campaigns to understand the demographics and psychographics of potential voters, these Little Brothers are collecting massive amounts of personal data – all with our tacit consent.


Read More
IT-fail

5 Common Pitfalls in IT Security & How to Overcome Them

Bill Wosilius
May 3, 2018

Whenever there’s a data breach, it’s easy to get caught up in the root cause analysis – a misconfigured device, an unpatched application, an employee falling for a phishing attack, you name it. But really, the root causes of most breaches are not these moment-in-time errors. Instead, they are almost always shortsighted decisions made well before the breach ever occurs.


Read More
Previous 1 2 … 76 77 78 79 80 81 82 83 84 … 111 112 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing