Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Dr. Allen Harper joins T-Rex Solutions as Executive Vice President of Cybersecurity

July 14, 2020
T-Rex Solutions, LLC announced Marine Corps veteran, entrepreneur and cybersecurity executive Dr. Allen Harper joined the organization as Executive Vice President of Cybersecurity. Dr. Harper will lead the company’s delivery of secure cloud services to the Federal government.
Read More
FTC

FTC launches new online tool for exploring military consumer data

July 14, 2020
The Federal Trade Commission launched a new tool that explores data about problems military consumers may experience in the marketplace. For the first time, data about reports the FTC has received from active duty service members and veterans will be available online in an interactive dashboard at ftc.gov/explore data.
Read More
C Blauner

5 Minutes with Charles Blauner, CISO in Residence, Team8

July 14, 2020

Charles Blauner is CISO in Residence for Team8, a venture group focused on cyber, data and AI technologies with roots in Israel’s elite military intelligence unit 8200. With an information security career primarily in financial services spanning over 30 years, Blauner held senior security executive roles for Citigroup since 2005. Prior to that, Blauner held several roles, including CISO at JP Morgan and Deutsche Bank.


Read More
election

Biden campaign hires cybersecurity experts to defend against potential threats

July 13, 2020
The presidential campaign of former Vice President Joe Biden announced that it had filled the positions of chief information security officer (CISO) and chief technology officer (CTO) in order to address potential cybersecurity threats to the campaign. 
Read More
gsx+

General Stan McChrystal to deliver keynote address at GSX+ on Military & Law Enforcement Appreciation Day

July 13, 2020
ASIS International has announced that General Stan McChrystal, US Army (RET), will present a Global Security Exchange Plus (GSX+) keynote address on Military & Law Enforcement Appreciation Day at GSX+.
Read More
SEC0219-data-Feat-slide1_900px

How to protect ERP data when access to corporate networks is both ubiquitous and for sale on the dark web

Piyush Pandey
Piyush Pandey
July 13, 2020
With a myriad of employees and contractors given ubiquitous access to business data, one thing is clear; identity has become the new security perimeter. Ensuring ERP data security, privacy, and compliance can no longer rely solely on network threat monitoring but requires using a layered identity defense to limit access to and within mission-critical applications.
Read More
Doorway to Cybersecurity

US Secret Services creates Cyber Fraud Task Force

July 13, 2020
In recognition of the growing convergence of cyber and traditional financial crimes, the U.S. Secret Service is formally merging its Electronic Crimes Task Forces (ECTFs) and Financial Crimes Task Forces (FCTFs) into a single unified network, which will be known as the Cyber Fraud Task Forces (CFTFs).
Read More
steven salar

Steven Salar named Chief Risk Officer at Nonprofits Insurance Alliance

July 10, 2020
Nonprofits Insurance Alliance (NIA) announced that Steven Salar has joined NIA as Chief Risk Officer (CRO) responsible for compliance, risk management, internal audit, employment risk consulting, loss control and member support.
Read More

Wright State University designated as a National Center of Academic Excellence in Cyber Defense Education

July 10, 2020
The National Security Agency and Department of Homeland Security have designated Wright State University as a National Center of Academic Excellence in Cyber Defense Education.
Read More
encryption

NIST kick-starts ‘threshold cryptography’ development effort

July 10, 2020
A new publication by cryptography experts at the National Institute of Standards and Technology (NIST) proposes the direction the technical agency will take to develop a more secure approach to encryption. This approach, called threshold cryptography, could overcome some of the limitations of conventional methods for protecting sensitive transactions and data.
Read More
Previous 1 2 … 554 555 556 557 558 559 560 561 562 … 714 715 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing