Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

empty conference table and chairs

President Biden appoints Scott Charney as Chair of NSTAC

Security Staff
February 6, 2023

President Biden announced the appointees for the National Security Telecommunications Advisory Committee. Scott Charney has been appointed as Chair.


Read More
medical professionals looking at computer

3 steps to lay the foundation for stronger healthcare managed defense

John Whetstone
February 6, 2023

Healthcare organizations must research their existing cybersecurity posture and establish strong internal processes at every level of the company.


Read More
Cybersecurity around the globe

$3M allocation supports Massachusetts-based cybersecurity center

Security Staff
February 6, 2023

A Cybersecurity Center of Excellence will be established at Massachusetts-based Springfield Technical Community College at Springfield Union Station.


Read More
Man thinking about money

Just 49% of organizations have funds for current cybersecurity needs

Security Staff
February 6, 2023

Only 49% of organizations have the budget to meet current cybersecurity needs and 11% can protect only their most critical assets, says NISC survey.


Read More
data on computer

Over half of organizations experienced an insider threat in 2022

Security Staff
February 3, 2023

Gurucul report results indicate insider threats are a top concern at organizations of all kinds with over half experiencing a threat in 2022.


Read More
two people working over a shared computer

Transforming the multigenerational cybersecurity workforce

Jeff Costlow
February 3, 2023

As the digital economy grows, digital crime grows with it. Building a multigenerational workforce may be the solution to prevent a data breach. 


Read More
man sitting in dark at computer desk

AI-based security solutions can detect & prevent fraudulent activity

Brett Beranek
February 3, 2023

Sophisticated fraud both is on the rise and wildly successful. AI-based security solutions can help prevent fraud by flagging suspicious activity.


Read More
group working together at table

Mitigating security risks with an evolving workforce

Mike Wilson
February 3, 2023

Companies must utilize best practices while filling productivity gaps while also managing the risks that come with working alongside external groups. 


Read More
Chaim Mazal

Chaim Mazal appointed Gigamon Chief Security Officer

Security Staff
February 3, 2023

Chaim Mazal has been named Chief Security Officer (CSO) at Gigamon and will take on a variety of responsibilities including IT and global security. 


Read More
Ride share

Ride-hailing company, inDrive, uses new platform to prevent fraud

Security Staff
February 3, 2023

The ride-share company is using a security platform to keep negotiations & prices transparent and dishonest & fraudulent users out of the system.


Read More
Previous 1 2 … 224 225 226 227 228 229 230 231 232 … 722 723 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

Coding

Epstein File Data Security Update: Raw Code Found in Emails

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing