Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » News

News
News RSS Feed RSS

McHugh podcast news header

What Does It Take to Be an Outstanding CSO or CISO?

Listen to Scott McHugh, Program Executive, Institute for Homeland Security at Sam Houston State University, in this podcast episode.
Jordyn Alger, Managing Editor, Security
Jordyn Alger
March 25, 2026

Scott McHugh, Program Executive, Institute for Homeland Security at Sam Houston State University, discusses what it takes to be a great CSO or CISO in the modern age.


Read More
Black computer screen with multicolored text

Security Leaders Share Thoughts on Foster City Cyberattack

Taelor Sutherland, Associate Editor
Taelor Sutherland
March 24, 2026

A ransomware attack on Foster City, California, triggered a state of emergency to access additional resources to keep systems up and running.


Read More
Code

3.7M Records Exposed, Many Belonging to Sears Home Services

Security Staff
March 23, 2026

Three different databases were publicly exposed, amounting to 3.7 million records. 


Read More
Crunchyroll

Hackers Claim to Have Breached Streaming Service CrunchyRoll’s Data

Security Staff
March 23, 2026

Hackers claim that they breached Sony’s anime streaming service CrunchyRoll. 


Read More
Person placing location pin on map

The FBI Buys Data to Track Movement, Location History

Security Staff
March 20, 2026

Director Patel stated the FBI purchases data that can be leveraged to track a person’s movement and location history.


Read More
Person holding phone

8M Confidential Crime Tips Hacked, Compromised

Jordyn Alger, Managing Editor, Security
Jordyn Alger
March 19, 2026

A hacker group claimed to breach a platform used for submitting tips about criminal events. 


Read More
FBI emblem

Trump’s Former Counter-Terrorism Official Investigated Over Alleged Leaks

Security Staff
March 19, 2026

Joe Kent is under investigation for alleged leaks of classified information


Read More
Computer with binary code hovering nearby

Stryker Update: FBI Seizes Website of Iran-Linked Hackers

Security Staff
March 19, 2026

The FBI has seized the website of the Iranian-linked hackers believed to be behind the recent cyberattack against Stryker. 


Read More
Spilled pills

GuardDog Telehealth Accesses Sensitive Medical Records Under False Pretenses

Jordyn Alger, Managing Editor, Security
Jordyn Alger
March 18, 2026

A telehealth organization accessed patient medical data in order to share it with law firms. 


Read More
Verizon on phone screen

Verizon Retail Customer Database Allegedly for Sale by Hackers: 6.3M Customers at Risk

Security Staff
March 17, 2026

One of the United States’ largest Verizon Authorized Retailers may have been compromised. 


Read More
Previous 1 2 3 4 5 6 7 8 9 10 … 906 907 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Classroom with desks and chairs

School’s Out, But Security’s Not: Preparing for K-12 Summertime Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing