Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity » Cybersecurity News

Cybersecurity News
Cybersecurity News RSS Feed RSS

SEC0719-Privacy-Feat-slide1_900px

DoJ Says Ex-Twitter Employees Acted as Agents for Saudi Arabia, Violated Twitter Users' Privacy

November 8, 2019
Ali Alzabarah, Ahmad Abouammo, and Ahmed Almutairi, aka Ahmed Aljbreen, were charged for their respective roles in accessing private information in the accounts of certain Twitter users and providing that information to officials of the Kingdom of Saudi Arabia.
Read More
social media

State of Calif. Investigating Facebook for Privacy Practices

November 8, 2019
California Attorney General Xavier Becerra filed a petition in the San Francisco Superior Court requesting that the court order Facebook Inc. to comply with an outstanding subpoena and investigative interrogatories issued by the Attorney General on behalf of the People of California. 
Read More
digital-cyber

Orchestrating Cybersecurity Across the Business Ecosystem

A cyber leader’s guide to learning the business and providing precise support.
matthew doan
Matthew Doan
November 7, 2019
Increasing a business’ digital competence is a need that’ll never go away; continual transformation is required to be competitive in the market. So much hinges on getting digital right that entire new disciplines and executive roles are springing up, including the Chief Digital Officer and Chief Transformation Officer. Change makes many people uncomfortable, but it’s a necessity.
Read More
c-suite

How to Increase Collaboration Between IT and Executive Leadership Teams

christopher gerg
Christopher Gerg
November 7, 2019

For enterprises to implement cloud technology successfully, the C-Suite and IT teams need to work closely to coordinate and deliver a wide range of as-a-service technical offerings. How can enterprises increase the relationship between the board and tech teams and help to develop a prosperous, collaborative partnership?


Read More
cyber network

Cybersecurity: A View From the Middle

gilbert morales
Gilbert Morales
November 7, 2019
Cybersecurity can be a scary beast for any organization of any size. The stakes are high. The adversaries are sly. The landscape is always shifting.These challenges can be especially significant for small and medium-sized businesses that have limited resources in capital and specialized expertise.
Read More
Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

Research Center's Failure to Encrypt Mobile Devices Leads to $3 Million HIPAA Settlement

November 7, 2019
The University of Rochester Medical Center has agreed to pay $3 million to the Office for Civil Rights at the U.S. Department of Health and Human Services for the data breaches it suffered during 2013-2017. 
Read More
Voting2

Election Security Is Top Priority for U.S. Government, Officials Say

November 7, 2019
Federal agencies and government officials have released a joint statement affirming that election security is a top priority for the U.S. Government.
Read More
cyber7-900px.jpg

Fraud Attacks Increase 30% in Q3 2019

November 7, 2019

Fraud increased 30 percent overall in Q3 2019 and bot-driven account registration fraud is up 70 percent as cybercriminals test stolen credentials in advance of the holiday retail season.


Read More
cyber5-900px.jpg

Cybersecurity Workforce Needs to Grow 145% to Close Skills Gap

November 6, 2019

A new study from ISC² estimates the current cybersecurity workforce at 2.8 million professionals and estimates that 4.07 professionals will be needed to close the skills gap (4.07 million professionals).


Read More

ISC East Keynote Speakers Announced

November 5, 2019
Security and public safety leaders Deanne Criswell, commissioner of the New York City Emergency Management Department, and Angela Stubblefield, deputy associate administrator for security and hazardoues materials safety at the Federal Aviation Administration (FAA), will headline the 2019 SIA Education@ISC East Keynote Series.
Read More
Previous 1 2 … 494 495 496 497 498 499 500 501 502 … 670 671 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing