Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » News

News
News RSS Feed RSS

Uber Launches Hacker Bounty Program

March 22, 2016

In May, Uber will hold a bug bounty, in which "security researchers" can earn money for finding flaws in Uber's system.


Read More

Regulatory Scrutiny, Economic Conditions and Cyber Threats Rank as Top C-Suite Risks

March 22, 2016

More organizations are realizing that additional risk management sophistication is warranted given the fast pace in which complex risks are emerging, according to a new survey. 


Read More

Cybersecurity Budgets Not Rising in Line with Threats

March 22, 2016

While cybersecurity budgets are growing, the increase is not in line with rising threats.


Read More

Twitter May Help Monitor Disaster Damage in Real Time

March 22, 2016

Social networks such as Twitter may be used for monitoring, assessing and even predicting damage caused by natural disasters in just a few hours.


Read More

20 Percent of Employees Would Sell Their Passwords

March 21, 2016

According to new research, one in five employees would be willing to sell their work passwords to another organization, up from one in seven last year.



 


Read More

Jeff Karpovich Awarded Medal of Excellence

March 18, 2016

Jeff Karpovich, CPP, CHPA, security chief and transportation director at High Point University, has received the Medal of Excellence, awarded by the National Association of Campus Safety Administrators.


Read More

Report Says Companies Leave Whistleblowers Waiting, Aren't Hearing About Retaliation

March 15, 2016

According to a report, companies taking longer every year to address whistleblower issues identified by employees.


Read More

EMV Merchant Adoption Slower Than Expected

March 13, 2016

Only 37 percent of U.S. merchant locations are EMV-ready four months after the October 1st, 2015 liability shift.
 


Read More

Georgia Senate OKs Campus Carry

March 11, 2016

The Georgia Senate gave final passage to a bill that for the first time would legalize firearms on all public colleges in Georgia.
 


Read More

Why Doodling Trumps Text Passwords

March 10, 2016

Rutgers University researchers have performed the first study of free-form gesture passwords for smartphones in the field.


Read More
Previous 1 2 … 867 868 869 870 871 872 873 874 875 … 901 902 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing