Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

computer half open with pink screen

97% of organizations take over a month to respond to bot attacks

Security Staff
September 21, 2023

A recent report by Netacea analyzed the affect of bot attacks and found that the average business loses 4.3%, of online revenues every year to bots.


Read More
keyboard with blue lighting

19% of organizations are prioritizing data visibility and remediation

Security Staff
September 21, 2023

According to a SpyCloud ransomware report, infostealer infections were 22% of ransomware attacks for North American and European companies.


Read More
NFL-logo.jpg

CISA holds cybersecurity exercise in preparation for Super Bowl LVIII

Security Staff
September 21, 2023

CISA, NFL, Allegiant Stadium and Super Bowl LVIII partners held a tabletop exercise this week to enhance cybersecurity response capabilities, plans and procedures.


Read More
computer next to phone on red stand

Cloud adoption is driving up IT budgets

Security Staff
September 21, 2023

The impact of cloud adoption on IT teams was analyzed in a report, finding that cloud platforms took up significant portions of IT budgets.


Read More
Computer, keyboard and tapes with pink lighting

Ransomware cyber insurance claims rose by 27%

Security Staff
September 20, 2023

Cyber insurance claims and trends were analyzed in a recent report finding a 12% increase in cyber claims over the first six months of the year.


Read More
people working at shared desk

55% of insider threats come from a negligent or mistaken insider

Security Staff
September 20, 2023

The causes and costs of insider threats were analyzed in a recent report that found that the average annual cost of an insider risk has increased 40%.


Read More
desk covered in office supplies

57% of small and medium enterprises experienced a cybersecurity breach

Security Staff
September 20, 2023

Small and medium enterprises were analyzed in a recent report by Guardz. According to the report, 57% of SMEs have experienced a cybersecurity breach.


Read More
Pink-keyboard-closeup

Be the threat: Case for hands-on threat simulations in cybersecurity

Aaron Rosenmund
September 20, 2023

The cyber threat landscape demands that organizations equip cybersecurity teams with the necessary skills to detect, respond and defend against malicious attacks.


Read More
construction site

Energy sector faces 39% of critical infrastructure attacks

Security Staff
September 19, 2023

According to a critical infrastructure cyberattack report, almost 60% of attacks are led by state-affiliated actors and 39% targeted energy.


Read More
empty hospital waiting room

51% of healthcare committed to investing more in cybersecurity

Security Staff
September 19, 2023

A recent healthcare security report shows that 86% of healthcare organizations have experienced data theft compared to 80% across all industries.


Read More
Previous 1 2 … 169 170 171 172 173 174 175 176 177 … 731 732 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing