Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Video surveillance analytics

Research Reveals How China and Russia Approach Surveillance

September 20, 2019

New research suggests China and Russia approach surveillance technologies differently. 


Read More
digital-cyber

Preparing For Physical and Cybersecurity Convergence

Today’s security professionals need comprehensive strategies that take both physical security and cybersecurity into account.
John Dames
September 20, 2019

In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams.


Read More
hacker

What are Hacker Preferences When Targeting Privileged Credentials?

September 19, 2019

During the Black Hat annual conference in Las Vegas August 3-8, 2019, Thycotic conducted research with nearly 300 attendees identifying either as “hackers” (49 percent) or “security professionals” (51 percent).


Read More
cloud-enews

Capital One: What’s in Your Cloud?

Chris Morales
September 19, 2019

The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.


Read More
cyber5-900px.jpg

Personal Information of 20 Million People in Ecuador is Breached

September 18, 2019

Ecuador is investigating a data breach in which the personal data of up to 20 million people was made available online.


Read More
biotechnology

Couple Charged for Stealing IP from Children's Hospital to Launch a Biotech Firm

September 18, 2019

A San Diego couple has been charged by the federal government with stealing intellectual property related to pediatric medical treatments from Nationwide Children's Hospital in order to launch a pharmaceutical company in China.

 


Read More
cyber-person

The Financial Sector Can Lead the Charge in Deception Security

doron kolton
Doron Kolton
September 18, 2019

This summer, more than one million Capital One clients had their information breached, furthering the financial sector’s infamous reputation of being the most breached industry with 35 percent of all data breaches. 


Read More
smb-cyber

Cyberattacks on IoT and SMBs Rapidly Increasing

September 18, 2019

The number of cybersecurity attacks events measured from January through June was twelve times higher when compared with the same period in 2018, an increase largely driven by IoT-related traffic, according to the Attack Landscape H1 2019 by F-Secure. 


Read More
edu4-900px.jpg

National Cyber League and Cyber Skyline Announce Top Cybersecurity School

September 18, 2019

Students from the University of Nevada – Reno prevailed against 5,026 students from 419 schools across the nation recognized as the top school in the nation during the National Cyber League (NCL) Spring 2019 season.


Read More
SEC0719-Privacy-Feat-slide1_900px

Most Organizations Not Ready For New Privacy Regulations

September 17, 2019

An Internet Society report finds that most organizations do not comply with existing global privacy regulations and are not ready for additional regulations going into effect in 2020.


Read More
Previous 1 2 … 663 664 665 666 667 668 669 670 671 … 728 729 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing