Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

cyber security bug bounty

Security researchers target bug bounties for cyber insights

Security Staff
June 3, 2022

Do security researchers and ethical hackers learn more about cybersecurity from their employer, schooling or bug bounty experience? The Ethical Hacker Insights Report 2022 surveyed 1,181 people with cybersecurity experience to learn more.


Read More
security-g771584b53_1920.jpg

One-third of defense contractors vulnerable to ransomware

Security Staff
June 3, 2022

Research from Black Kite, "Centralizing Supply Chain Cybersecurity: U.S. Federal Government Risk in 2022," found that 32% of defense contractors are vulnerable to ransomware.


Read More
M Ducsak.jpg

Michael J. Ducsak new Chief Information Security Officer at Sourcepass

Security Staff
June 2, 2022

Michael J. Ducsak is the new Chief Information Security Officer (CISO) at Sourcepass, where he will oversee cybersecurity strategy, risk assessment and mitigation, compliance, cloud security and more.


Read More
cyber-password-freepik1170x658v4.jpg

Four ways cybercriminals can hack passwords

New Stu Sjouwerman CEO KnowBe4.jpg
Stu Sjouwerman
June 2, 2022

Learn about four techniques hackers usually employ to hack usernames and passwords, as well as tips to bolster password defense.



Read More
hacker

Secrets in code make passwords vulnerable to hackers

Security Staff
June 2, 2022

The “Secrets Insights Across the Software Supply Chain'' report from Apiiro discovered vulnerable personally identifiable information (PII) and passwords stored in private and public repositories.


Read More
docs-freepik1170x658v2.jpg

Microsoft Office zero day vulnerability discovered

Maria Henriquez
June 1, 2022

A new Microsoft Office zero-day security vulnerability allows adversaries to execute PowerShell commands via Microsoft Diagnostic Tool (MSDT) by opening a Word document. 


Read More
malware threat detection

33% of cybersecurity leaders name zero trust their top priority

Security Staff
June 1, 2022

Zero trust has been named an important aspect of enterprise cybersecurity by security leaders across eight countries, according to the Zero Trust Impact Report from Illumio.


Read More
software code on computer

Modernizing application security to retool DevSecOps

Jeff Williams
Jeff Williams
June 1, 2022

Application security remains a wide attack vector for cybercriminals, but cybersecurity leaders can use tools to better detect vulnerabilities in their applications and software supply chains.


Read More
cyber security

82% of CIOs believe their software supply chains are vulnerable

Security Staff
May 31, 2022

A report from Venafi titled "CIO Study: Software Build Pipelines Attack Surface Expanding" examines cybersecurity executive response to software supply chain security.


Read More
insurance-policy-freepik1170x658v4.jpg

The value of cyber insurance for small businesses

linda-comerford.jpg
Linda Comerford
May 31, 2022

Cyber insurance won't stop a data breach, but it will protect small businesses from the high costs of a security breach or cyberattack.



Read More
Previous 1 2 … 280 281 282 283 284 285 286 287 288 … 715 716 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing