Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » News

News
News RSS Feed RSS

credit card security

Only 1 in 4 global organizations keep cardholder payment data secure 

October 7, 2020
With many companies struggling to retain qualified CISOs or security managers, the lack of long-term security thinking is severely impacting sustained compliance within the Payment Card Industry Data Security Standard, according to new study. 
Read More
isc west 2020

Charles Burns opens day 2 of ISC West with Uber’s global security insights

October 6, 2020
Charles Burns, head of global security and engagement at Uber, opened day two of ISC West with a keynote titled, “How Uber is Scaling Enterprise Risk Management at the Speed of Global Transportation.”
Read More
brigham young university

Brigham Young University creates new security department

October 6, 2020
Brigham Young University (BYU) announced the formation of the new BYU Security Department, which will function separately from and alongside the BYU Police Department. The BYU Security Department will oversee on-campus security for buildings, such as the Museum of Art and the Harold B. Lee Library, as well as campus properties, such as the Motion Picture Studio and West Campus (former Provo High School). The department will also have responsibility for campus parking.
Read More
national harbor

National Harbor 2020 exercise tests interagency recovery and response

October 6, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) joined with public and private-sector partners to conduct an interagency Tabletop Exercise (TTX) called “National Harbor 2020 – Recovery Phase Exercise,” September 29 – 30, to test the processes and plans required by regional government and business partners following a notional catastrophic incident at National Harbor outside of Washington, D.C.
Read More
password cyber

72% of businesses experienced increase in endpoint and IoT security incidents in the past 12 months

October 6, 2020
According to new data released by Cybersecurity Insiders, 72% of organizations experienced an increase in endpoint and IoT security incidents in the last year, while 56% anticipate their organization will likely be compromised due to an endpoint or IoT-originated attack with the next 12 months. 
Read More
fintech cybersecurity

American Transaction Processors Coalition reconstitutes cybersecurity activities; rebrands as Cyber Council

October 6, 2020
Rebranding as the ATPC Cyber Council in 2020, the Council hopes to create a community of cybersecurity thought leaders to facilitate regular and focused discussions on cyber resiliency for the Payment and FinTech industries.
Read More
mergers and acquisitions continue virtually amid COVID-19

Study says virtual dealmaking will continue post-pandemic, regardless of security concerns

October 6, 2020
Organizations are still making deals and mergers and acquisitions. Many are doing virtual deals; but the move comes with security concerns, says Deloitte report.
Read More
nocturnal security events skyrocket

Thirty-five percent of high-risk security operations incidents happen after most employees are offline for the day

October 6, 2020

A new report, the 2020 Security Operations Report from Arctic Wolf, is pulling back the curtain on some lesser known trends in their new security operations threat report, which details security trends in operations since the start of the pandemic.


Read More
isc west 2020

ISC West opens virtual conference with keynote on securing the IoT

October 5, 2020
ISC West began this week with a keynote from Michael MacKenzie, general manager of IoT connectivity & control services at Amazon Webservices IoT.
Read More
terror

DHS Policy’s Targeted Violence and Terrorism Prevention program (TVTP) hosted 5th Digital Forum on Terrorism Prevention

October 5, 2020
On September 1 and 2, DHS Policy’s Targeted Violence and Terrorism Prevention program (TVTP) hosted the 5th Digital Forum on Terrorism Prevention for approximately 60 mostly Atlanta-based civil society leaders. This year’s Forum gave these leaders an opportunity to learn directly from technology and marketing experts on how to combat terrorist use of the internet. Community leaders attended multiple sessions over the two-day Forum, including: “The Threat—Narratives & Recruitment in the Online Space;” “Responses to Terrorism;” “Research, Trends & Data;” “Tech Talk & Toolkit;” and “Online to Offline Interventions & Referrals.”
Read More
Previous 1 2 … 504 505 506 507 508 509 510 511 512 … 902 903 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing