Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Chicago Healthcare Provider Sinai Health System Hit With Data Breach

January 3, 2020
Sinai Health System, a Chicago-based healthcare provider, has been hit with a data breach.
Read More
ransomware-enews

US Coast Guard Hit With Ryuk Ransomware

January 3, 2020
Ryuk ransomware has struck a facility belonging to the U.S. Coast Guard (USCG), affecting industrial control systems, security cameras and more, according to the USCG.
Read More
Strong Cybersecurity: The Critical Role of Lifecycle Management - Security Magazine

Hospitality Company Landry's Inc. Identifies Malware On Payment System

January 2, 2020
Landry's, Inc., an American, privately owned, multi-brand dining, hospitality, entertainment and gaming corporation, has reported that it identified malware on its payment processing system. 
Read More

SAIC to Offer 10 Scholarships to Veterans Pursuing Cybersecurity Careers

January 2, 2020
Science Applications International Corp. (SAIC) is now accepting applications for its CyberWarrior™ Scholarship. In collaboration with (ISC)2, the Center for Cyber Safety and Education, the scholarship program provides military veterans with career development opportunities to help meet the national need for qualified cybersecurity professionals.
Read More
SEC0120-cyber-Feat-slide1_900px
Cyber Tactics

New Year Prognostications: A Perennial Guide for the Perplexed

John McClurg
John McClurg
January 1, 2020

2020 heralds a few major shifts that will transform cybersecurity: ransomware attacks, artificial intelligence, facial recognition and mobile cybersecurity.


Read More
cyber6-900px.jpg

Security Predictions for 2020

Corey Nachreiner
Corey Nachreiner
December 30, 2019

In this year’s Cyber Security Predictions, the WatchGuard Threat Lab has imagined the top cyber attacks we’ll see in 2020 and has also provided tips for simplifying your approach to stopping them.


Read More
SEC0719-Privacy-Feat-slide1_900px

Anomaly Detection in SOC – Friend or Foe?

Lots of security vendors talk about integrating innovative techniques using Artificial Intelligence. In cybersecurity, this often boils down to supervised or unsupervised anomaly detection of measures attributes. However, in many cases there is a big gap between the identification of anomalies and transforming them into actionable data.
haim Zlatokrilov
Haim Zlatokrilov
December 27, 2019
There are lots of buzzwords floating around cybersecurity: machine learning, artificial intelligence, supervised and unsupervised learning … In many cases these advanced technologies are based on anomaly detection.
Read More
election

Connecticut Receives $5 Million for Election Cybersecurity

December 27, 2019
Connecticut Secretary of the State Denise Merrill says the state will receive about $5 million in federal funds to help protect the 2020 elections from cyberattacks.
Read More

CISA Releases Guidance to Assist Agencies Moving From Wide Network Perimeters to Micro-Perimeters

December 27, 2019
The Cybersecurity and Infrastructure Security Agency (CISA) released new Trusted Internet Connections (TIC) 3.0 draft guidance that adjusts to federal agencies narrowing their cyberdefenses. 
Read More
It's Time to Change Your Perception of the Cybersecurity Professional

New ISACA Resources Offer Step-by-Step Guidance for NIST Cybersecurity Framework Implementation Using COBIT 2019

December 27, 2019
New ISACA resources offer step-by-step guidance for the U.S. National Institute of Standards and Technology's (NIST) Framework for Improving Critical Infrastructure Cybersecurity (CSF). 
Read More
Previous 1 2 … 638 639 640 641 642 643 644 645 646 … 728 729 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing