Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity » Cybersecurity News

Cybersecurity News
Cybersecurity News RSS Feed RSS

Home Depot Reports Credit Card Security Breach

September 2, 2014

Banks say they are seeing evidence that Home Depot stores may be the source of a massive new batch of stolen credit and debit cards.


Read More

4 Challenges to Address in Corporate Cyber War

We are fighting a cyber war and need to take proactive steps to protect ourselves and our companies as the virtual bullets fly.
David Elfering Ron Woerner
September 1, 2014

Establishing command and control gives the power to professionals so they can properly assess the risks and determine which threats pose the greatest danger and must be considered a high security priority. Authority also requires that they identify potential threats that may be considered “acceptable risks” to the organization – meaning they are worth keeping an eye on, but don’t warrant a significant security investment.


Read More

3 in 10 Consumers Losing Trust in Retail Data Security

Only 55 percent of global consumers feel stores use security systems that adequately protect financial data against hackers and data breaches
September 1, 2014

Nearly three in 10 global consumers do not trust retailers to protect stored personal or financial data against cyber risks, and 58 percent think financial institutions do a better job of protecting data than retailers, government agencies or law enforcement.


Read More

Can Stopping Cybercrime Positively Impact World Economies?

McAfee and CSIS conclude that cybercrime costs businesses approximately $400 billion worldwide, with an impact on approximately 200,000 jobs in the United States and 150,000 jobs in the EU.
September 1, 2014

The report commends partnerships between countries for combating cybercrime, praising public-private partnerships in particular for beginning to show tangible results in terms of fighting cybercrime, such as the partnership of 11 nations to take down a crime ring associated with the GameOver Zeus botnet in June.


Read More

5 Essential Cybersecurity Truths for CFOs

Cyber attacks have become one of the most worrisome risks considered chief financial officers
September 1, 2014

The rate of CFOs citing cyber attacks as a key concern has risen sharply over the survey’s four-year history, directly correlating to both the frequency and cost of cyber attacks.


Read More

Power Grid Upgrades Create Security Risks

The U.S. power grid is in the process of an enormous transformation into a smart grid
September 1, 2014

According to Security Implications of the Smart Grid, a report from Marie Wright, PhD, of Western Connecticut State University, and Robert Billings, Jr., B.A., of Billings Electric, the shift to a smart grid infrastructure means that power companies will be using more IP-based communications and commercial, off-the-shelf technologies.


Read More

CISOs Get the Blame for Breaches, Little Help

Executives Say “No”
September 1, 2014

Twenty-eight percent of respondents say their CISO has made cybersecurity decisions that have led to negative effects on the enterprise’s financial health, including lost business, decreased productivity or impaired service levels.


Read More

Managing Thumb Drive Security Risks

Network security practitioners are well aware of the challenges posed by removable data storage devices, including thumb drives.
Chabinsky-2016-200px.jpg
Steven Chabinsky
September 1, 2014

When the Department of Homeland Security purposefully dropped data disks and USB flash drives in the parking lots of federal agencies and government contractors, 60 percent of the found objects were inserted into an agency or contractor network.


Read More

Sony Network Hacked, Executive's Flight Grounded After Threats

August 26, 2014

A Twitter user both claimed responsibility for the denial-of-service attack against Sony's PlayStation Network and also suggested there was a bomb on-board Sony executive John Smedley's American Airlines flight.


Read More

Tesla Hires Hackers to Increase Vehicle Security

August 26, 2014

In coming months, Tesla will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.


Read More
Previous 1 2 … 631 632 633 634 635 636 637 638 639 … 670 671 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing