Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity » Cybersecurity News

Cybersecurity News
Cybersecurity News RSS Feed RSS

Safety in the Cloud - Best Practices for Private and Public Models

Lucas Roh
August 8, 2011
With market analysis firm International Data Corporation (IDC) predicting $72.9 billion in cloud-related revenues by 2015, the cloud as the preferred storage and application environment is the future. Additionally, the IDC study indicates that by 2015, spending on public cloud services will account for nearly half of the net new growth in overall IT spending. This spending includes money spent on application development and deployment, infrastructure, storage, and servers.
Read More

You Breach, You Pay?

diane-2016-200.jpg
Diane Ritchey
August 1, 2011

There is no shortage of news stories dealing with cybercrime and data breaches. From Citigroup admitting that computer hackers breached the bank’s network and accessed the data of about 200,000 bank card holders in North America, to the huge data breach at Sony and its Playstation Network, it’s all over the news. 


Read More

5 Ways to Safely Destroy a Hard Drive

Responsible Hard-Drive Destruction — Let’s Get Real
Andrew Kelleher
July 26, 2011
It’s no secret that our computer hard drives contain a lot of things we’d rather keep secret. Because the information security field is my home turf, I’m troubled by some of the loose talk I hear about how to destroy used drives. There is a whole lot of bad advice online, especially.
Read More

The Multi-Layered Approach: 4 Ways to Secure Your IT Assets

Stephen Midgley
July 12, 2011
When it comes to preventing the loss and theft of mobile assets within the enterprise, there is no one-stop-shop security solution. However, the need has never been greater as mobile devices become more prevalent and hold more sensitive data.
Read More

Return of the Phone Phreakers: Business Communications Security in the Age of IP

Adam Boone
April 1, 2011

Virtually every telecom manager in business today has received the pitch: “Cut your telecom trunking costs by 50 percent. Improve your business communications flexibility...


Read More

Openness Opens Doors with IT and Physical Security

zalud-2016-200px.jpg
Bill Zalud
April 1, 2011

Warning: This article does not contain talk of convergence, silos, fusion, tipping points, disruptive technologies, a place at the table and all the other new-age, highfalutin mumbo-jumbo that too often says more about the speaker than the concerns of the listener.


Read More

Proposed Puerto Rican Scanning Regulation Will Result in Increased Costs and Supply Chain Delays

Douglas Heffner
March 8, 2011

In December 2010, the Puerto Rico Ports Authority (PRPA) issued a proposed regulation that would require all inbound cargo containers, regardless of whether the container was shipped from a company located in the United States or from a company located in a foreign country, to be scanned for contraband.  If enacted, the proposed scanning regulation would increase costs and result in supply chain delays.  The cost would range from $58 to $70 per container (depending on the size of the container).  


Read More

Crime Pattern Analysis and the Security Director: A Primer

Steve W. Ballantyne
March 1, 2011

Crime pattern analysis (CPA) is a generic term that covers a wide range of approaches and techniques in the field of crime analysis. CPA looks for crime patterns and trends. Some of these methods and theories used in crime pattern analysis include criminology theories such as Routine Activity Theory, Rational Choice Theory, Repeat Victimization and Crime Pattern Analysis.


Read More

Working in the Cloud: Critical Security Questions to ask any SaaS provider

Tony Schmitz
February 22, 2011
As the number of solutions available in the cloud grows and an increasing number of organizations turn to SaaS-based solutions to improve operations while reducing their costs, an increasing amount of sensitive information is being communicated via the Internet. IT professionals are rightly concerned with uptime, privacy risks and overall security.
Read More

Data Loss Prevention – Two Approaches to Save Corporate Reputation and Protect the Bottom Line

Todd Feinman
February 8, 2011
Every two seconds someone becomes a victim of identity theft in America and last year, identity theft totals amounted to $100 billion. Even though many organizations are expanding security efforts, the number of identity theft incidents is still increasing as thieves continue to change their tact on a daily basis.
Read More
Previous 1 2 … 667 668 669 670 671 672 673 674 675 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing