Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity » Cybersecurity News

Cybersecurity News
Cybersecurity News RSS Feed RSS

Generic Image for Cyber Security

Home Depot Reports Credit Card Security Breach

September 2, 2014

Banks say they are seeing evidence that Home Depot stores may be the source of a massive new batch of stolen credit and debit cards.


Read More
Corporate cyber war

4 Challenges to Address in Corporate Cyber War

We are fighting a cyber war and need to take proactive steps to protect ourselves and our companies as the virtual bullets fly.
David Elfering Ron Woerner
September 1, 2014

Establishing command and control gives the power to professionals so they can properly assess the risks and determine which threats pose the greatest danger and must be considered a high security priority. Authority also requires that they identify potential threats that may be considered “acceptable risks” to the organization – meaning they are worth keeping an eye on, but don’t warrant a significant security investment.


Read More
Global News

3 in 10 Consumers Losing Trust in Retail Data Security

Only 55 percent of global consumers feel stores use security systems that adequately protect financial data against hackers and data breaches
September 1, 2014

Nearly three in 10 global consumers do not trust retailers to protect stored personal or financial data against cyber risks, and 58 percent think financial institutions do a better job of protecting data than retailers, government agencies or law enforcement.


Read More
Global News

Can Stopping Cybercrime Positively Impact World Economies?

McAfee and CSIS conclude that cybercrime costs businesses approximately $400 billion worldwide, with an impact on approximately 200,000 jobs in the United States and 150,000 jobs in the EU.
September 1, 2014

The report commends partnerships between countries for combating cybercrime, praising public-private partnerships in particular for beginning to show tangible results in terms of fighting cybercrime, such as the partnership of 11 nations to take down a crime ring associated with the GameOver Zeus botnet in June.


Read More
Global News

5 Essential Cybersecurity Truths for CFOs

Cyber attacks have become one of the most worrisome risks considered chief financial officers
September 1, 2014

The rate of CFOs citing cyber attacks as a key concern has risen sharply over the survey’s four-year history, directly correlating to both the frequency and cost of cyber attacks.


Read More
Global News

Power Grid Upgrades Create Security Risks

The U.S. power grid is in the process of an enormous transformation into a smart grid
September 1, 2014

According to Security Implications of the Smart Grid, a report from Marie Wright, PhD, of Western Connecticut State University, and Robert Billings, Jr., B.A., of Billings Electric, the shift to a smart grid infrastructure means that power companies will be using more IP-based communications and commercial, off-the-shelf technologies.


Read More
Global News

CISOs Get the Blame for Breaches, Little Help

Executives Say “No”
September 1, 2014

Twenty-eight percent of respondents say their CISO has made cybersecurity decisions that have led to negative effects on the enterprise’s financial health, including lost business, decreased productivity or impaired service levels.


Read More
Thumb drive security

Managing Thumb Drive Security Risks

Network security practitioners are well aware of the challenges posed by removable data storage devices, including thumb drives.
Chabinsky-2016-200px.jpg
Steven Chabinsky
September 1, 2014

When the Department of Homeland Security purposefully dropped data disks and USB flash drives in the parking lots of federal agencies and government contractors, 60 percent of the found objects were inserted into an agency or contractor network.


Read More
New Newswire Feature Image 3/8/2012

Sony Network Hacked, Executive's Flight Grounded After Threats

August 26, 2014

A Twitter user both claimed responsibility for the denial-of-service attack against Sony's PlayStation Network and also suggested there was a bomb on-board Sony executive John Smedley's American Airlines flight.


Read More
Generic Image for Cyber Security

Tesla Hires Hackers to Increase Vehicle Security

August 26, 2014

In coming months, Tesla will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.


Read More
Previous 1 2 … 622 623 624 625 626 627 628 629 630 … 661 662 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Silhouette of hand holding phone

Pushing Mobile Access to New Levels of Operational Efficiency

AI chat screen on cellphone

68% of Organizations Experienced Data Leakage From Employee AI Usage

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Pills spilled

5.4M Affected by Healthcare Data Breach

Full train

Scattered Spider’s Newest Targets: Transportation and Airlines

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing