Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » News

News
News RSS Feed RSS

finance

Compliance activities and fines cost organizations nearly $4m per year

October 15, 2020
 Telos Corporation, provider of cyber, cloud and enterprise security solutions, unveiled new findings from a survey conducted by independent research firm Vanson Bourne that highlights organizations’ ongoing struggle to keep up with IT security and privacy compliance regulations.
Read More
south carolina

S.C. Department of Education funds over $33 million in PPE and supplies for all school districts

October 14, 2020
State Superintendent of Education Molly Spearman announced at River Springs Elementary School that the South Carolina Department of Education (SCDE) will purchase and distribute over $33 million worth of personal protective equipment (PPE) and supplies to all eighty one public school districts to support efforts to maintain and return to face to face instruction. 
Read More
Study: Consumers Rely on Context when Sharing Information/information security, personal information theft, consumer trust, retail security

COVID-19 driving an acceleration in adoption of identity verification

October 14, 2020
Businesses in the UK and U.S. have been ramping up their identity verification processes in order to protect customers during the COVID-19 pandemic. 
Read More
Baylor to implement COVID-19 surge testing

Baylor University implements surge testing for off-campus students

October 14, 2020
Baylor University in Texas will implement a surge testing program for off-campus students due to the number of surrounding community members the student population interacts with.
Read More
cyber cloud

Security researcher details exploitation of common misconfigurations in Salesforce Lightning

October 14, 2020
A security researcher published a blog outlining the details of common misconfigurations in Salesforce that can result in guest users, or hackers leveraging guest user access, gaining access to sensitive data in Salesforce.
Read More
cyber

NJOHSP promotes cyber safety for cybersecurity awareness month

October 14, 2020
The New Jersey Office of Homeland Security and Preparedness (NJOHSP) reaffirmed its commitment to keep the State cyber safe after Governor Phil Murphy proclaimed October as Cybersecurity Awareness Month on October 2. NJOHSP and its cyber division, the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), are also participating in National Cybersecurity Awareness Month (NCSAM).
Read More
Insider threat: FBI releases a video for chief security officers

Stopping the insider threat: FBI releases a video for CSOs

October 14, 2020

A 30-minute movie, inspired by true events, called “The Nevernight Connection," details the fictional account of a former U.S. Intelligence Community official targeted by foreign intelligence service via a fake profile on a professional networking site and recruited to turn over classified information. 


Read More
Website scans are not completed nearly as often as the c-suite thinks

Executive overconfidence is a security risk

October 14, 2020

A new reports aims to understand the maturity and effectiveness of web application security in organizations worldwide. For example, 75% of executives believe their organization scans all web applications for security vulnerabilities, while nearly 50% of security staff say they don’t. 


Read More
finance

Fraud continues to grow for financial services and lending firms, both before and during the pandemic

October 14, 2020

LexisNexis Risk Solutions released its LexisNexis Risk Solutions 2020 True Cost of Fraud Study: Financial Services & Lending for the United States and Canadian financial services and lending sectors.


Read More
Cyber Incident Recovery

How cyberattackers use Microsoft Office 365 tools against organizations to steal data

October 13, 2020

Vectra released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.

Vectra released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.
Read More
Previous 1 2 … 499 500 501 502 503 504 505 506 507 … 902 903 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing