Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Healthcare professional

Protecting healthcare data, improving trust through security measures

Searing headshot
Don Searing
Vitale headshot
Alan Vitale
January 2, 2025

In today’s digital age, protecting sensitive medical information is not just a regulatory requirement but a cornerstone of trust and business integrity.


Read More
Board room

Minimizing CISO personal liability through end of year budgeting

Fitzsimmons headshot
Amanda Fitzsimmons
December 30, 2024

To minimize the potential risks to their organizations and their own personal well-being, there are a number of steps CISOs should consider taking as they work to prepare for fiscal year 2025.


Read More
Working desktop

How the web’s foundational tech is evolving in the era of remote work

Morales headshot
Carlos Morales
December 27, 2024

Understanding the critical role of DNS in maintaining connectivity and security is essential.


Read More
Human hand and robot hand

AI vs AI: In the age of AI-driven attacks, only AI can keep up

Reed headshot
Jeff Reed
December 23, 2024

The rapid adoption of AI and GenAI-powered tools in the enterprise are creating new and highly accessible attack surfaces for threat actors, and legacy tools are struggling to keep pace.


Read More
Man in suit

Executives targeted in mobile spearphishing attacks

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
December 20, 2024

Executives are targeted in mobile spearphishing attacks, and security leaders share their insights. 


Read More
Water faucet and cup

Internet-exposed HMIs are a risk to water facilities, CISA warns

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
December 19, 2024

Water and wastewater system facilities have been urged to secure internet-exposed human-machine interfaces (HMIs).


Read More
Credit card and padlock

5M unique credit and debit cards exposed in data breach

Security Staff
December 19, 2024

The details of 5 million unique credit and debit cards were exposed in a data breach. 


Read More
Laptop on table

Credential phishing attacks rose by 703% in H2 of 2024

Security Staff
December 18, 2024

A new report analyzes scam trends to help organizations prepare for threats in 2025.


Read More
Monitor with coding

Nearly 400,000 WordPress credentials stolen

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
December 18, 2024

A threat actor labelled as MUT-1244 has stolen more than 390,000 WordPress credentials. 


Read More
Swirls of orange, yellow, and red on black screen

How businesses can protect themselves from data breaches

Eric Cohen
December 17, 2024

Although PCI compliance isn’t mandated by law, failing to comply with PCI DSS can result in investigations, fines, and penalties.


Read More
Previous 1 2 … 27 28 29 30 31 32 33 34 35 … 686 687 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing