Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity » Cybersecurity News

Cybersecurity News
Cybersecurity News RSS Feed RSS

Generic Image for Cyber Security

Police Detain 80 in International Cyber Crime Operation

May 19, 2014

Police in 16 countries seized cash, firearms and drugs and arrested 80 people suspected of peddling virus software believed to have infected hundreds of thousands of computers.


Read More
Generic Image for Cyber Security

DHS Secretary Predicts U.S. Cyber Legislation this Summer

May 14, 2014

U.S. Homeland Security Secretary Jeh Johnson says that Congress is likely to agree on cybersecurity legislation this summer.


Read More
heartbleed

Measuring the Aftershocks of Heartbleed

Steve Pate
May 13, 2014
It has barely been a month since the announcement of the Heartbleed bug, and all seems to have gone fairly quiet.
Read More
Generic Image for Cyber Security

FBI Warns of Cyberattacks to Healthcare Sector

May 9, 2014

The FBI has warned healthcare providers their cybersecurity systems are lax compared to other sectors, making them vulnerable to attacks by hackers.


Read More
Generic Image for Cyber Security

New York to Increase Assessment of Bank Cybersecurity Plans

May 8, 2014

New York's banks will face new cybersecurity assessments carried out by the Department of Financial Services (DFS), under plans unveiled by Governor Andrew Cuomo.


Read More
cyber 2 feat

White House Outlines Parameters for Withholding Security Vulnerability Information

May 2, 2014

Why wouldn’t the government disclose a cybersecurity vulnerability? According to a White House blog post, it could mean foregoing “an opportunity to collect crucial intelligence that could thwart a terrorist attack, stop the theft of our nation’s intellectual property, or even discover more dangerous vulnerabilities that are being used by hackers or other adversaries to exploit our networks,” writes White House cybersecurity coordinator Michael Daniel.


Read More
Global News

Recent Data Breaches Hit Nearly 80% of Banks, Financial Accounts

Headlines continue to highlight data breaches, especially those compromising payment, banking and personal data.
May 1, 2014

The silver lining to the breaches, according to the ACI report, is that although data breach-related fraud has had a negative impact on banks’ and financial institutions’ bottom lines, more than 40 percent of respondents indicated that their customers have appreciated the proactive outreach and response to market events, which helps to keep financial institutions on the right side of customer satisfaction, rebuilding brand trust.


Read More
Security Talk

Are Productivity Apps More Harm than Good?

According to the website “Tech Cocktail,” there are some “awesome apps” out there to make employees more productive at work.
diane-2016-200.jpg
Diane Ritchey
May 1, 2014

Banning specific cloud applications is bound to fail. Maintaining a blacklist of cloud applications is ineffective, at best.


Read More
Integrator

Making Sense of LANs, MANs, WANs and More

Get to know Taylor Carr, Vice-President, Business Development & Integration for Securadyne Systems, and learn how Securadyne’s enterprise security executive customers are addressing cybersecurity in their enterprises.
May 1, 2014

Virtually all of the new video solutions we have deployed over the past few years have been IP-based. However, we still have many customers with existing large analog systems, and they need to operate, expand and optimize those systems today.


Read More
Steven Chabinski

Stopping Cybersecurity Breaches Means Rethinking Consequences

Would there be a greater return on investment if our information sharing focused less on enabling private sector victims to better duck and cover, and focused more on enabling the government to get the bad guys?
May 1, 2014

Regardless of how vigorously the industry applies risk management principles and how diligently the government shares information, there is no chance the private sector can consistently withstand intrusion attempts from foreign military units and intelligence services or even, for that matter, from transnational organized crime.


Read More
Previous 1 2 … 618 619 620 621 622 623 624 625 626 … 652 653 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing