Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Copy-of-Security-Podcast--Hanson.png

Listen to Meredith Wilson, Founder of Emergent Risk International talk geopolitical risks

October 20, 2021

In Security's latest Women in Security Edition of The Security Podcasts, Meredith Wilson talks about how enterprise security professionals can prepare their organizations for geopolitical risks. 


Read More
Zero-trust-freepik

4 stages of a zero trust self-assessment

Matt Graves
October 20, 2021

You want to begin implementing zero trust security at your organization, but where do you start? Let's walk through clear stages to build a zero trust framework that serves as the roadmap for your organization’s journey to better security and greater efficiency.  


Read More
cyber-security-freepik

The real-world impacts of cyberattacks

Kimberly Johnson
October 20, 2021

Assessing cyber risk is essential to a business and is a key contributor to its overall reputational risk. Businesses need to take cyber risk into account in overall business strategy and planning. 


Read More
Man working on laptop computer

Zero trust and the role of least privilege for securing cloud workloads

Corey Williams
October 20, 2021

When employing a zero trust strategy at an enterprise, cybersecurity teams must consider instituting a least privilege policy — providing only strictly necessary access credentials to employees and revoking them when no longer needed.


Read More
ransomware freepik

Companies lack basic cybersecurity practices to combat ransomware

October 19, 2021

Axio's 2021 State of Ransomware Preparedness report reveals that organizations are not equipped to defend against ransomware due to deficiencies in implementing and sustaining basic cybersecurity practices, including managing privileged administrator credentials and ensuring visibility of supply chain risk.


Read More
Business women

Bridging the gender gap in cybersecurity

Madeline Lauver
October 19, 2021

Women make up only 24% of the cybersecurity field, according to an ISC2 study. Cybersecurity leaders Sharon Smith, Lori Ross O'Neil, Aanchal Gupta and Meg West discussed how to solve the problem of underrepresentation in the industry at the ISC2 Security Congress 2021.


Read More
ransomware freepik

83% of ransomware victims paid to get data restored

October 19, 2021

ThycoticCentrify released new research confirming that ransomware has become a preferred method for cyberattacks, with nearly two out of three companies (64%) surveyed admitting to be victims of a ransomware attack in the last 12 months.


Read More
ransomware-virus-freepik

CISA issues advisory on BlackMatter ransomware

October 19, 2021

The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) published a cybersecurity advisory regarding BlackMatter ransomware cyber intrusions targeting multiple U.S. critical infrastructure entities, including two U.S. food and agriculture sector organizations.


Read More
Boardroom

The dos and don'ts of advocating for cybersecurity in the boardroom

Madeline Lauver
October 19, 2021

Chris Jacquet, VP and Chief Information Security Officer (CISO) at Hitachi Vantara, explains how best to approach cybersecurity in the boardroom. Being prepared, honest and concise can help a CISO secure much-needed funding for their department.



Read More
working-remote-office-freepik.jpg

Security in the flexible working world

Dan DeMichele
October 19, 2021

Whether remote, in the office or in a co-working space, all employees must be sensitized to cyber threats. It is important not only to provide training for employees but also to give IT security a permanent place in the corporate culture. 


Read More
Previous 1 2 … 367 368 369 370 371 372 373 374 375 … 724 725 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing