This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Topics » Cyber » Cyber Security News

Cyber Security News
%{topic} RSS Feed RSS

smartphone1-900px.jpg

Smartphone Bans are Taking a Toll on the Federal Workforce

Mikefongbiopichori1
Mike Fong
February 13, 2019
No Comments

As if changing missions, resource shortages and salary pressures weren’t big-enough challenges, many federal workers must deal with another hurdle that’s been largely overlooked: smartphone bans.


Read More
smartcity

How to Lay the Groundwork for Protecting Smart City Connectivity

Kevin Taylor
February 12, 2019
No Comments
Most people in the physical security industry are familiar with the 5 Ds: deter, detect, delay, deny and defend. These principles seem universally applicable for facility or asset protection use cases. But what principles should we apply in areas of open public access?
Read More
Security newswire default

President Trump Signs Executive Order to Back Artificial Intelligence

February 12, 2019
No Comments

President Trump signed an executive order that is aimed to guide the development and regulation of artificial intelligence in the U.S.


Read More
critical infrastructure 2 responsive default

Study on Electric Grid Resiliency Finds Urgent Need for Cybersecurity Investments

February 12, 2019
No Comments

Cost recovery for electric sector cybersecurity investments and development of resilience metrics to gauge the industry's progress are two of several recommendations by Vermont Law School researchers and a six-month study of electric grid security.


Read More
SEC0219-pen-Feat-slide1_900px

Penetration Testing: White Box, Grey Box or Black Box

When setting up a penetration test or security evaluation, your results will depend on how much information your researcher has in advance.
Claire Meyer
February 11, 2019
No Comments

White, grey or black? Depending on which color you choose, the scope and results of your penetration test could vary widely.


Read More
Doorway to Cybersecurity

A New Cybersecurity Incident Strikes K-12 Schools Nearly Every Three Days

February 11, 2019
No Comments

A U.S. school district becomes the victim of a cyberattack almost as often as every three days.


Read More
Brian Fricke

BBVA Compass names Brian Fricke CISO

February 8, 2019
No Comments

BBVA Compass has named Brian Fricke as its Chief Information Security Officer (CISO), where he will oversee the bank's Information Security and Engineering Risk functions.


Read More
password1-900px.jpg

How Americans Leave their Personal Info Open to Thieves

February 8, 2019
No Comments

A new poll by CreditCards.com found that 92 percent of Americans have taken at least one big data security risk in the past year.


Read More
small business cyber

How Does the NIST Small Business Security Act Affect Your SMB?

Heather Paunet
February 7, 2019
No Comments
2018 brought a lot of change to small business. In the wake of many new cybersecurity threats and breaches, the National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act was passed into law in August 2018, and it requires NIST to provide cybersecurity resources to small and medium-sized businesses (SMBs) to help protect them against future problems.
Read More
rackspace-wargames

Moving to a State of Resiliency: Why War Games Are the Key

Kelly_brian
Brian Kelly
February 7, 2019
No Comments
You can’t simply learn resiliency; there isn’t a book or set of checkmarks you can apply to a list that means you are resilient. Instead, it’s real-world training like War Gaming that delivers the closest “I’ve been there” experience and creates the muscle memory needed to respond effectively when an incident – and all the fear, confusion and paralysis it can bring – occurs.
Read More
Previous 1 2 3 4 5 6 7 8 9 … 139 140 Next
Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

security-center

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

Globe

Which Countries Have the Worst and Best Cybersecurity?

SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

Cyber Doors

2018 Set a New Record for Security Vulnerabilities

cyber-SMB

8 Vulnerabilities Penetration Testers Recommend You Address in 2019

20180222ENR_Skyward_Drones_360x184customcontent

Events

February 19, 2019

Drones and Surveillance at MetLife Stadium

Unmanned aerial systems pose a legitimate threat to sporting events in America. The devices are not only becoming cheaper and easier to own, but technology has advanced to such a point that virtually anyone — hobbyist or terrorist — can fly one. MetLife Stadium is home of the New York Jets and New York Giants, in addition to numerous entertainment events and concerts each year.

February 26, 2019

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
View All Submit An Event

Poll

Employee Background Screening

How Often Does Your Organization Conduct Background Screening on Employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security-500

Security Magazine

SEC-Feb-2019-Cover_144px

2019 February

In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing