Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

hospital medical device

5 FBI recommendations for medical device cybersecurity

Madeline Lauver
September 16, 2022

The Federal Bureau of Investigation (FBI) has issued guidance for healthcare security leaders to protect medical devices from cyberattacks.


Read More
Wallace Dalrymple headshot

Wallace Dalrymple named CSO at standardized testing nonprofit ETS

Security Staff
September 15, 2022

Wallace Dalrymple has been named the first Chief Security Officer (CSO) at Educational Testing Service (ETS), a standardized testing nonprofit.


Read More
remote workforce

Managing security compliance with a hybrid workforce

Derek Kernus
September 15, 2022

Leading a hybrid workforce requires looking at cybersecurity compliance differently. Security technology may hold the answer for hybrid work.


Read More
SEC0821-cyber-Feat-slide1_900px

Federal cybersecurity laws can improve private sector security

Rick Lazio
September 15, 2022

The private sector can use the latest cybersecurity legislation as the roadmap for improving their security and digital infrastructure.



Read More
bots-freepik1170x658 (1).jpg

Bot attacks in 2022 and how companies can protect themselves

Matthew Gracey-McMinn
September 15, 2022

The four main types of bots — scraper bots, scalper bots, sniper bots, and account checker bots —  are all on the rise. 


Read More
computer room

How SOCs distribute cybersecurity alerts to avoid burnout

Sergey Soldatov
September 15, 2022

Discover three ways security operations centers (SOCs) can distribute cybersecurity alerts to avoid security employee burnout.


Read More
cyber

4 ways organizations fail to address cybersecurity risk

Security Staff
September 14, 2022

Security leaders say their organizations are failing to manage cyber risk. The 2022 Security Priorities Study, released by Foundry (formerly IDG Communications), explores how.


Read More
resignation

Third-party risk challenges presented by the Great Resignation

Egoroff headshot
Andrew Egoroff
September 14, 2022

Adopting a zero trust strategy can help an organization avoid third-party risk management (TPRM) pitfalls related to the Great Resignation.


Read More
ambulance on street

Why is healthcare a top target for cybersecurity threats?

Shawn Dickerson
Shawn Dickerson
September 13, 2022

Healthcare organizations have been targeted by ransomware due to numerous factors, including theft of valuable health data and inadequate security.


Read More
green and red network data

The impact of a data breach

Tommy Johnson
September 13, 2022

Data breaches ranging from credential phishing to ransomware extortion affect organizations widely. Cybersecurity leaders can prevent breaches using these security strategies.


Read More
Previous 1 2 … 263 264 265 266 267 268 269 270 271 … 730 731 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing