Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Amy Tong

Amy Tong Reappointed California's Director of Technology

April 20, 2020

Calif Governor Gavin Newsom announced that Amy S. H. Tong has been reappointed director of the California Department of Technology, where she has served as director since 2016.


Read More
WOI

The Executive Women's Forum announces its 18th Annual Conference and Women of Influence Awards

April 20, 2020

The Executive Women's Forum on Information Security Risk Management & Privacy (EWF) announces its 18th Annual Conference "Empowering Women In Cybersecurity, Risk And Privacy: Enhancing Business Resilience And Trust," to be held October 20-22, 2020 in Scottsdale, Ariz.


Read More
RSA 2017: The "Culture" of Cybersecurity Collaboration

CISA Issues Alert on North Korean Cybersecurity Threat

April 17, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) issued an alert to the international community, network defenders and the public of the North Korean cyber threat.
Read More
Who’s The Boss? Reporting to the Chief Administrative Officer

Scams and Phishing Attacks Grow as People Operate Online due to COVID-19

April 17, 2020
Due to COVID-19, there are more Americans conducting life online than ever before – over 70 percent are teleworking, and of that, 34 percent have been granted telework options who would otherwise not have had them – but 62 percent have signed up for new tools and platforms to work, study or play.
Read More
UW Superior

UW-Superior to Offer Online Master’s Degree in Cybersecurity

April 17, 2020

The University of Wisconsin-Superior is introducing a completely online Master of Science in Cybersecurity this fall.


Read More

The Biggest Cybersecurity Mistakes CISOs Might be Making Today

Eyal Hayardeny
April 17, 2020
Even if a Chief Information Security Officer (CISO) performs 99 percent of their tasks perfectly, there is still plenty of opportunity to make mistakes. When companies have unpatched vulnerabilities, or incorrect configurations, or other holes in their security tactics (not to mention the "set it and forget it” mentality after deployment)—security management can quickly become a CISO’s nightmare. This is why it's so important for leaders to consider the following when developing the right security approach for their organizations. 
Read More
bryan jones

Bryan Jones Named Chief Technology Officer at the Office of Experience

April 17, 2020
The Office of Experience (OX), a Chicago, Ill.-based design and digital innovation agency, announced that it has named Bryan Jones as Chief Technology Officer. Jones comes to OX most recently from the Marketing Store, where he served as Global Chief Technology Officer delivering product solutions for McDonalds, Nissan and T-Mobile.
Read More
SEC1019-cyber-Feat-slide1_900px

Information Security Forum: Nine Cybersecurity Threats Organizations can Expect Through 2022

April 16, 2020
The Information Security Forum (ISF), a London-based authority on cybersecurity, information security and risk management has released Threat Horizon 2022, which highlights nine major threats, broken down into three themes, that organizations can expect to face over the next two years as a result of increasing developments in technology. 
Read More
Most Countries without Cybersecurity Strategy

Cybersecurity Hygiene Requirement Meets Its Toothbrush

amitai ratzon
Amitai Ratzon
April 16, 2020
CEOs cite cybersecurity as the biggest threat to the world economy and as a result, the global spend in cybersecurity is expected to surpass $1 trillion by 2021. An enterprise cyber attack can turn into a catastrophe in a matter of hours, potentially damaging any business at any point in time. As we see from the past few years, the greatest have already fallen.
Read More
SEC0818-cyber-feat-slide1_900

GAO: DOD Needs to Take Decisive Actions to Improve Cybersecurity Hygiene

April 16, 2020
The Government Accountability Office (GAO) has released a new report, noting that the Department of Defense (DOD) has not fully implemented three of its key initiatives and practices aimed at improving cybersecurity hygiene and is at risk of cyberattacks.
Read More
Previous 1 2 … 586 587 588 589 590 591 592 593 594 … 713 714 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing