Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Video game controller over monitor

Gaming companies must protect IP from exfiltration during development

Nick Kael
May 16, 2023

It’s time for companies to take a tough stance on preventing data leakage and cyber theft, and adopt cybersecurity measures during the digital production process.


Read More
man-writing-on-paper.jpg

90% of small business leaders underestimate cyber incident costs

Security Staff
May 15, 2023

A new report reveals that 91% of SMEs with a cyber insurance policy say that their insurance provider helped them avoid potential incidents.


Read More
multicolored lights

Financial sector has highest password reuse rate

Security Staff
May 15, 2023

Employee exposure was measured in a report that observed a 62% password reuse rate among Fortune 1000 employees who have been exposed more than once. 


Read More
Semi-Trucks.jpg

Cybersecurity fundamentals for logistics partners

Gene Price Brion St. Amour
May 15, 2023

A multi-faceted, comprehensive approach to mitigating vendor cybersecurity risks will improve resiliency for logistics companies, their employees and customers. 


Read More
desk with technology on the surface

Andrew Rallis hired as Chief Risk Officer at Lincoln Financial Group

Security Staff
May 12, 2023

Andrew Rallis was hired as Executive VP & Chief Risk Officer for Lincoln Financial Group. Rallis has more than 40 years of risk management experience.


Read More
hospital beds

Rural hospital cybersecurity legislation introduced to Senate

Security Staff
May 12, 2023

New legislation addresses the need for skilled cybersecurity professionals and digital security enhancement protocols in rural healthcare settings.


Read More
Spreadsheet.jpg

Manual processes dominate TPRM as security incidents increase

Security Staff
May 12, 2023

A new study shows 48% of companies still depend on spreadsheets, while 41% report experiencing an impactful third-party breach in the last year.


Read More
Cybersecurity-lock.jpg

47% of all internet traffic came from bots in 2022

Security Staff
May 11, 2023

A new report reveals that in 2022, 47.4% of all internet traffic came from bots, a 5.1% increase over the previous year.


Read More
man in suit adjusting his tie

Transact appoints David Shaw as Chief Information Security Officer

Security Staff
May 11, 2023

David Shaw has joined Transact Campus as CISO. Shaw has experience in identity & access management, regulatory compliance and incident response.


Read More
laptop open on desk

69% of IT professionals have adopted SLOs for the first time

Security Staff
May 11, 2023

A recent survey indicates a focus on system reliability due to the pandemic driving cloud adoption, remote workers and supply chain issues. 


Read More
Previous 1 2 … 207 208 209 210 211 212 213 214 215 … 731 732 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing