Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

SEC0219-career-Feat-slide1_900px

Keeping Security Secure

tim howard
Tim Howard
January 27, 2020
Breakthroughs and advancements in security emerge every day, and there is no better time than now to start being careful with the security information we share with others.
Read More
e-scooter

New Research Exposes Cybersecurity Risks for E-Scooters and Riders

January 27, 2020
New research finds e-scooters can be hacked. 
Read More
cyber6-900px.jpg

Ohio Hires CISO for Election Security

January 27, 2020

Ohio Secretary of State Frank LaRose announced Sean M. McAfee as the new CISO for the Ohio Secretary of State's office.


Read More
SEC0419-leadership-feat-slide1_900px

Top Four Security Predictions for 2020

hal lonas
Hal Lonas
January 24, 2020
What are the top four security predictions enterprise security should be aware of moving into 2020?
Read More
online-credit-card-enews

Euro Cup and Olympics Ticket Reseller Hit by Malware

January 24, 2020
Sites belonging to a reseller of tickets for Euro Cup and the Tokyo Summer Olympics, two major sports events happening later this year, have been infected with malware that steals payment card details.
Read More
Anne Hardy

Anne Hardy Named CISO at Talend

January 23, 2020

Talend announced it has named Anne Hardy its chief information security officer (CISO).


Read More
password1-900px.jpg

Forgot Your Password? Better Not to Have One, says World Economic Forum

January 23, 2020

A new report by the World Economic Forum finds that freeing ourselves of passwords will actually make us safer and businesses more efficient.


Read More
election

FBI Announces New Policy for Notifying State and Local Election Officials of Cyber Intrusions with Elections

January 23, 2020

The Federal Bureau of Investigation (FBI) announced a new internal policy to guide the timely federal notification of state and local officials of cyber intrusions affecting election infrastructure.


Read More
Utilities Combat Cyber Threats by Pooling Resources & Best Practices - Security Magazine

Risk of Destructive Attacks on the Electric Sector Significantly Increases

January 23, 2020
A new report highlights hacking activity targeting U.S. electric utilities and oil and gas firms attributed to the threat group Magnallium.
Read More
cyber_lock

Remote Access Trojan Was a Major Threat in 2019

January 23, 2020
The rise in popularity of the Remote Access Trojan, or RAT, among other financially motivated threat actors, was a major threat in 2019.
Read More
Previous 1 2 … 627 628 629 630 631 632 633 634 635 … 724 725 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing