Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

cyberinsurance

Enterprise security teams struggle with the growing pace, volume and sophistication of cyberattacks

September 30, 2020
The 2020 State of Security Operations study from Forrester Consulting finds that enterprise security teams around the world continue to struggle with the growing pace, volume and sophistication of cyberattacks. The commissioned survey of over 300 enterprise security operations professionals reveals that only 46% of enterprises are satisfied with their ability to detect cybersecurity threats.
Read More
purdue

Purdue University Global to commemorate Cybersecurity Awareness Month with variety of activities

September 30, 2020
Purdue University Global will commemorate Cybersecurity Awareness Month with a variety of activities throughout October.
Read More
cyber hack

68% of hackers initiate attacks to be challenged with 71% opting for websites

September 30, 2020
Survey data acquired by Finbold.com indicates that about 68% of hackers initiate attacks in order to be challenged. The survey featured over 3,150 respondents from at least 120 countries and territories.
Read More
A new report from DTEX Systems shows this year’s shift to a largely remote workforce by the Global 5000 has significantly changed behaviors of trusted insiders.

More than half of companies discover employees intentionally masking online activities according to report

September 30, 2020
A new report shows this year’s shift to a largely remote workforce by the Global 5000 has significantly changed behaviors of employees and trusted insiders.
Read More
ransomware

Guard against ransomware and business disruption with offline backups

Laura Loreda
Laura Loredo
Diane Salazar
Diana Salazar
Carlos Sandoval
Carlos Sandoval
September 30, 2020
Corporate enterprises and governments used to be the main targets of cyberattacks, but now any organization with an online presence is vulnerable. The surge in remote working due to the pandemic significantly increases risk as IT departments balance the demands of security, remote access and business continuity. Widespread use of new apps and solutions, credential sharing, unsecured Wi-Fi, weak passwords, lack of encryption and more provide cybercriminals with many opportunities to exploit gaps in security.  
Read More
Will Security Enterprises Survive the Digital Transformation? - Security Magazine

HR and Security: Work together, win together

Why HR and Security have finally teamed up
willem ryan
Willem Ryan
September 30, 2020
The Physical Security industry is at an inflection point. Digital transformation and Security Convergence have accelerated, hastened by the persistent pandemic. Physical Security, HR and IT departments have been forced to work together quickly in designing back-to-work strategies, realizing that separate silos of operations just won’t cut it any longer.
Read More
data_security_-_blog_-768x423

The scale of our modern economy: Balancing safety and privacy

Chip Luman Sean Lowder
September 29, 2020

In order to get the future right, the reopening process must balance COVID-19's numerous implications—health, safety, rights, and freedoms. We don’t need to dismiss privacy to gain value from the health data involved. But before we discuss how to find that balance, we need to understand the role data plays in the decision-making process and why that is even more important now.


Read More
iot-enews

Top security considerations for enterprises planning IoT adoption

Laurent Soubielle
September 29, 2020
There is no one-size-fits-all IoT security solution. Organizations need to spend time selecting an IoT solution that maps to their unique business needs to ensure they’re able to maximize the investment’s potential without creating any security liabilities. Here’s what enterprises need to consider when creating their IoT deployments.
Read More
ransomware

UHS Hospitals hit by Ryuk ransomware, forced to shut down systems

September 29, 2020
Universal Health Services (UHS), one of the largest healthcare services provider, has reportedly shut down systems at healthcare facilities around the U.S. after a cyberattack hit its networks. 
Read More
internet of things

Five key steps to full device defensibility

Part 3: Protecting distributed IoT devices
Bud Broomhead
September 29, 2020
To help you and your organization plan and implement an improved cyber hygiene program, we now present a framework for full IoT device defensibility in real world deployments at scale. This framework represents current state-of-the-art best practices for protecting IoT devices, and can form the backbone of your assessment, evaluation, and improvement plans. Follow the steps below to strengthen your network defenses.
Read More
Previous 1 2 … 519 520 521 522 523 524 525 526 527 … 714 715 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing