Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

fraud-enews

1.1 billion fraud attacks detected since the beginning of 2020

August 6, 2020
A new Arkose Labs study revealed that in the first half of 2020, there were more than 1.1 billion online fraud attacks, double the attack volume compared to the second half of 2019 and a 25 percent attack rate increase across all transactions. 
Read More
Unprepared Companies Vulnerable to Ransomware Attacks

​Canon suffers ransomware attack that impacts numerous services

August 6, 2020
​Canon has suffered a ransomware attack that impacts numerous services, including Canon's email, Microsoft Teams, USA website, and other internal applications.
Read More

CISA releases Trusted Internet Connections 3.0 core guidance documentation

August 6, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) released core guidance documentation for the Trusted Internet Connections (TIC) program, developed to assist agencies in protecting modern information technology architectures and services.
Read More
tiktok

Security of TikTok: How does a Microsoft acquisition change things?

Sam Rubin
Sam Rubin
August 6, 2020
Security fears linger around the wildly popular, Chinese-owned social media platform TikTok, and discussions are in the works for the platform to potentially be acquired by Microsoft. Should users be concerned in the interim? Will a change of ownership to a U.S.-based company allay security and privacy fears?
Read More
wildfire

More than $103 billion in economic losses due to natural disasters in 2019

August 5, 2020
In 2019, 396 natural disasters were recorded in EM-DAT with 11,755 deaths, 95 million people affected and $103 billion in economic losses across the world, according to Natural Disasters 2019, a new report by the Centre for Research on the Epidemiology of Disasters, The Université Catholique de Louvain  and the U.S. Agency for International Development (USAID). 
Read More
election

CISA releases guide to vulnerability reporting for America’s election administrators

August 5, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) released the Guide to Vulnerability Reporting for America’s Election Administrators. The guide walks election officials through the steps of establishing a vulnerability disclosure program.
Read More
identity theft, fraud prevention, cybersecurity, data theft

80% of internal auditors face barriers while getting involved in fraud risks management

August 5, 2020
The vast majority (80 percent) of internal auditors are facing barriers to being involved in managing fraud risk, despite almost two thirds (62 percent) saying they had seen an increase in fraud incidents over the past five years, according to a new report by Kroll, The Institute of Internal Auditors (IIA) and Internal Audit Foundation.
Read More
Eric Holmquist

Eric Holmquist named Executive Vice President, Chief Risk Officer at Customers Bank

August 5, 2020
Eric Holmquist joined Customers Bank as Executive Vice President and Chief Risk Officer. Holmquist has more than thirty-five years of financial industry expertise, spanning enterprise risk management, executive reporting, information management programs, and is skilled in creating operational efficiency and risk alignment.
Read More
Banks Ramping Up Cyber Focus, Working to Coordiante Efforts

The fall of BitBazaar and the rise of Neptune: new dark web marketplaces research

August 5, 2020
The Photon Research Team of Digital Shadows has published new research highlighting a popular dark web marketplace called BitBazaar that got called out for attempted manipulation of subscriber numbers on the popular dark web platform, Dread. 
Read More
The 'People' Part of Enterprise Cybersecurity Strategies

20% of workers don’t follow company security policies all the time

August 5, 2020
IT personnel burn a full month of work (21 days) managing Identity and Access Management (IAM) each year on mundane tasks such as resetting passwords and tracking app usage, according to a new survey from 1Password.
Read More
Previous 1 2 … 545 546 547 548 549 550 551 552 553 … 715 716 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing