Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

jose-Dieudonné

José Dieudonné Named Chief Information Officer at Muhlenberg College

March 16, 2020
Following a national search, Muhlenberg has named José Dieudonné as the College's chief information officer.
Read More
mark mcmath

Mark McMath Named Enterprise Chief Information Officer at the Medical University of South Carolina

March 16, 2020
Mark McMath has been named enterprise chief information officer (CIO) for Information Solutions at the Medical University of South Carolina (MUSC).
Read More
Which Security Testing is Right for Your Enterprise? - Security Magazine

Scams, Fraud and Misinformation: How Cybercriminals are Taking Advantage of Coronavirus

March 13, 2020
Concern over the Coronavirus (COVID-19) has dominated global headlines. And now cybercriminals are using all tools at hand to take advantage of this concern to spread phishing and social engineering scams and misinformation. 
Read More
joe eng

Billtrust Names Joe Eng as Chief Information Officer

March 13, 2020
Joe Eng has joined Billtrust as Chief Information Officer. Eng will oversee Billtrust's IT infrastructure, security and product strategy and development teams. 
Read More
electric-enews

European Electricity Association Confirms Hackers Breached its Office Network

March 13, 2020
ENTSO-E, the European Network of Transmission System Operators, has announced that it found evidence of a successful cyber intrusion in its office network. 
Read More
computer-cyber

FIRST Releases Updated Computer Security Incident Response Team (CSIRT) Services Framework

March 13, 2020
The Forum of Incident Response and Security Teams (FIRST) has released an updated version of its Computer Security Incident Response Team (CSIRT) Services Framework.
Read More
SEC0320-soft-feat-slide1_900px.jpg

Securing Soft Targets and Crowded Places

How can enterprise security secure soft targets and crowded places without intruding on the entertainment aspect of events?
Maria Henriquez
March 13, 2020

What do you and your team need to know about securing soft targets and crowded places?


Read More
RSA 2017: The "Culture" of Cybersecurity Collaboration

Microsoft: New Wormable, Unpatched Bug in SMB File-Sharing System

March 12, 2020
Microsoft has published a security advisory, warning users that there is a remote code execution vulnerability in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests.
Read More
Is Your Vendor Risk Management Program Working? - Security Magazine

A Look into a CISO’s First Quarter

wayne reynolds
Wayne Reynolds
March 12, 2020
Becoming a new CISO brings new exciting opportunities and responsibilities but also new challenges and pressure. In the past few years, the role of the CISO has become increasingly complex as it evolves from a predominately technical role to a more strategic, advisory capacity.
Read More
online shopping

Bill Introduced to Ensure Transparency for Third-Party Sellers of Online Product Sales

March 12, 2020

U.S. Senator Bill Cassidy, M.D. (R-LA) introduced legislation to fight the online sale of stolen, counterfeit and dangerous consumer products by requiring extensive transparency of large-volume third-party sellers in online retail marketplaces.


Read More
Previous 1 2 … 615 616 617 618 619 620 621 622 623 … 728 729 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing