Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Security Education

Cloud Workloads at Risk From Security Failings

January 9, 2018

Research from WinMagic has found that security, management and compliance challenges are impacting the benefits businesses are receiving from using the cloud as their infrastructures become more complex.


Read More
edu4-900px.jpg

Many Employees Confident in their STEM Skills

January 8, 2018

In a survey by PwC of people across the UK, Germany, China, India and the US, 69% of workers agreed or strongly agreed that they possess digital skills.


Read More

Employers Increasingly Demand Computer Science Skills in Non-Tech Jobs

January 7, 2018

Roughly two-thirds of the highest-paying and fastest-growing jobs in fields like design and marketing now demand computer science skills, according to a new report from labor market analytics firm Burning Glass Technologies and Oracle Academy.


Read More
Cybersecurity passwords

The Worst Passwords of 2017 Revealed

January 7, 2018

For the second year in a row, "123456" remained the worst password.


Read More
Cybersecurity Leadership Images

Study Reveals Disparity Between Consumer Cybersecurity Concerns and Behaviors

January 3, 2018

Despite awareness of the need for cybersecurity, many consumers are not taking proactive steps to keep their personal information protected from identity theft.


Read More
The Top 12 Practices of Secure Coding - Cyber Tactics - Security Magazine

The Top 12 Practices of Secure Coding

Chabinsky-2016-200px.jpg
Steven Chabinsky
January 1, 2018
The list provides a quick summary of the top 12 security practices to mitigate risks from internal and third-party software.
Read More
cyber6-900px.jpg

What's Next for Cybersecurity in 2018?

Scott Manson
December 26, 2017

We live in a world that is networked together, where companies rely on networked systems and their data is stored in the cloud.


Read More
Cybersecurity Leadership Images

How Healthcare is a Major Target for Cybercriminals

Brandon Bekker
December 21, 2017

The internet of things has transformed the healthcare sector, allowing security practitioners to easily share information and deliver personalized treatments.


Read More

Speed of Tech. Advancements, Resistance to Change are Top Risks for Businesses

December 19, 2017

The rapid pace of technological developments and disruptive innovations, along with organizational resistance to change, are the top concerns for boards of directors and business leaders around the world heading into 2018.


Read More
Doorway to Cybersecurity

How Cyber Criminals Took Uber for a Ride

Seth Berman
December 18, 2017

The nearly daily reports of massive hacking incidents continue to demonstrate a shocking level of corporate incompetence.


Read More
Previous 1 2 … 708 709 710 711 712 713 714 715 716 … 724 725 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing