Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » News

News
News RSS Feed RSS

LinkedIn app

LinkedIn remains most-impersonated brand by phishing campaigns

Security Staff
July 28, 2022

The Q2 2022 Brand Phishing Report from Check Point Research (CPR) found that LinkedIn is the most-impersonated brand when it comes to phishing campaigns.


Read More
healthcare-hipaa-freepik1170x658v57.jpg

NIST updates HIPAA cybersecurity guidance

Maria Henriquez
July 27, 2022

For improved healthcare cybersecurity, NIST has released an updated draft of the HIPAA security rule guidance. 


Read More
pipeline-freepik1170x658b57.jpg

TSA updates cybersecurity requirements for pipeline owners and operators

The revised directive enhances cyber resilience and security
Security Staff
July 27, 2022

The new TSA security directive takes a performance-based approach to enhancing cybersecurity for pipeline owners and operators. 


Read More
blame culture

Does cybersecurity's 'blame culture' affect incident reporting?

Security Staff
July 27, 2022

A report from Gigamon explores the culture of blame in cybersecurity and its effect on incident reporting.


Read More
Hampton Cantrell headshot

Hampton Cantrell named Chief of Campus Security at Caltech

Security Staff
July 27, 2022

Campus safety and law enforcement leader Hampton Cantrell has been named the new Chief of Campus Security and Parking Services at the California Institute of Technology (Caltech).


Read More
t-mobile-freepik1170x658.jpg

T-Mobile to pay $350m settlement for data breach

Maria Henriquez
July 26, 2022

T-Mobile has agreed to pay $350 million to customers affected by a data breach, in an effort to settle a class action lawsuit. 


Read More
Security magazine SBS Cannabis

Major cannabis business risks and security considerations

Tune into these five-minute videos for a crash course on the biggest security risks within the cannabis sector as well as mitigation best practices.
Security Staff
July 26, 2022

Tune into our suite of videos focused on different risks within the Cannabis sector.


Read More
identity-freepik1170x658v470.jpg

Identity security is a priority for IT security teams, but not understood by the C-suite

Maria Henriquez
July 26, 2022

Despite good intentions, over 60% of companies have a long way to go to protect privileged identities and access, according to a Delinea report of IT security decision makers.


Read More
messaging-discord-freepik1170x658.jpg

Cybercriminals are using messaging apps to deliver malware

Security Staff
July 26, 2022

Cybercriminals have started to use messaging apps like Discord and Telegram to spread malware, according to Intel 471 security research. 


Read More
cloud security

60% of cybersecurity leaders not confident in their cloud security tactics

Security Staff
July 26, 2022

The Global Study on Zero Trust Security for the Cloud from Appgate and conducted by the Ponemon Institute surveyed security professionals to examine cloud security and zero trust practices.


Read More
Previous 1 2 … 233 234 235 236 237 238 239 240 241 … 899 900 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Red block among white blocks

Plenty of Associations, But Not Enough Association

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing