Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

coffee shop counter

SMB employees may be the cause of cyber compromises

Lisa Kilpatrick
July 12, 2023

It's important to consider how employee negligence leads to cybersecurity incidents, and what preventative measures to take to avoid future risk.


Read More
white cable on dark carpet

Small and home office router malware discovered by researchers

Security Staff
July 12, 2023

A new malware that targets small and home office (SOHO) routers has been discovered by Lumen Technologies. The malware has been named "AVrecon".


Read More
lock graphic on dark blue background

54% of organizations struggle with shadow IT

Security Staff
July 12, 2023

IT and security leaders were surveyed on malware readiness. The report found that security leaders are concerned about malware compromising data.  


Read More
AMA: CISO Edition - Diego Souza

AMA: CISO Edition — Diego Souza

Security Staff
July 12, 2023

Diego Souza, Global Chief Information Security Officer (CISO) at Cummins, Inc., shares cybersecurity tactics and career advice in this AMA episode.


Read More
Medical Training for Security

Report: Edge computing in healthcare is taking off

Security Staff
July 12, 2023

In a new report, focused on the healthcare industry, found the primary use case was tele-emergency medical services.


Read More
Human hand and AI Hand

Hackers: Generative AI unlikely to replace human cybersecurity skills

Security Staff
July 12, 2023

A new report finds that 72% of hackers believe artificial intelligence (AI) will not replace the creativity of humans in security research and vulnerability management.


Read More
Maneet Sing headshot

Maneet Singh hired as Chief Information Officer at Odyssey

Security Staff
July 11, 2023

Maneet Singh has been hired as Chief Information Officer at Odyssey Logistics & Technology Corporation. Singh comes with over 20 years of experience.


Read More
phone with lock on purple screen and yellow background

An in-depth look at cyber protection: extended detection and response

Ilya Markelov
July 11, 2023

Detection and response are not always straightforward tasks as complex cybersecurity infrastructures create an additional burden on IT security teams.


Read More
cat and mouse

Stay ahead of the cybersecurity cat and mouse game

Rom Hendler
July 11, 2023

Phishers, hackers, cybercriminals, script kiddies and everyone associated with email phishing continues to develop creative ways to evade email security protection layers.


Read More
black screen with openAI logo

GenAI will amplify cybersecurity threats, but there's hope

Jonathan Barney Jeff Caso Justin Greis Noah Susskind
July 10, 2023

Whether firms adopt generative AI (GenAI) or not, hackers and security researchers are already exploring how it could be abused to attack anyone.


Read More
Previous 1 2 … 189 190 191 192 193 194 195 196 197 … 731 732 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing