Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Five Steps to Developing a Healthcare Information Technology Security Plan

John Brady
John Brady
August 10, 2018

Security breaches have become common place. Daily, we hear cybersecurity breach reports in the media. However, when healthcare institutions are impacted, consumers see this as “more detrimental” than other industry breaches.


Read More

Security Industry Association to Present Award Highlighting Advancement of Women in Security

August 8, 2018

The Security Industry Association (SIA) has opened nominations for the inaugural SIA Progress Award, an initiative sponsored by SIA’s Women in Security Forum. The recipient of this new award will be recognized at SIA Honors Night 2018 on Nov. 14 in New York City.


Read More
SEC0818-banking-feat-slide1_900px

A Nucleus of Information-Sharing: Mastercard’s Fusion Center

When it comes to addressing global fraud and security in the financial sector, it takes a network to defeat a network.
August 8, 2018

With so many government agencies and departments involved in security operations abroad (such as eliminating key targets or searching for specific terrorists), the essential flow of information was so slow and clunky that only three operations could be coordinated each month.


Read More

Bob Kolasky to Head New DHS National Risk Management Center

August 8, 2018

Bob Kolasky, acting assistant secretary for infrastructure protection at the Department of Homeland Security’s National Protection and Programs Directorate, has been named director of the National Risk Management Center (NRMC), reported Meritalk.


Read More

Why Employees are Your Greatest Cyber Risk

August 8, 2018

A new study has found that nearly two in five workers admitted to clicking on a link or opening an attachment from a sender they did not recognize.


Read More
SEC0818-edu-feat-slide1_900px

Building a Solid Security Structure as the Foundation Starts to Shake

Steve Durbin CEO ISF.jpg
Steve Durbin
August 1, 2018

By 2020, security professionals will be immersed in a hyper-connected IoT world. What does this mean for your threat landscape?


Read More
SEC0818-cyber-feat-slide1_900

Taking AIM at “Reasonable” Cybersecurity

August 1, 2018

After a data breach, regulators strive to evaluate if an enterprise fulfilled "reasonable" cybersecurity standards… without defining what "reasonable" looks like. 


Read More

The Security 500 Survey -- Deadline is Extended!

July 31, 2018

The deadline to complete this year's Security 500 survey has been extended to August 31!


Read More
world-in-data-breaches-banner1

Where Do Data Breaches Occur?

More than 7 million data records are stolen every day.
July 27, 2018

As companies and businesses rely more on technological advancements to collect and store consumer information, they run the risk of exposing sensitive data to anyone from malicious groups to tech-savvy individuals.


Read More
cyber6-900px.jpg

IBM Study: Cost of a Data Breach Reaches $350 Million

July 25, 2018

A study IBM Security and conducted by Ponemon Institute found that the average cost of a data breach globally is $3.86 million, a 6.4 percent increase from the 2017 report.


Read More
Previous 1 2 … 702 703 704 705 706 707 708 709 710 … 729 730 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing