Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

laptop

Making SASE and zero trust work for the enterprise

Pascal Menezes
November 30, 2023

The ever-evolving corporate networks now encompass both cloud and on-premises infrastructure and distributed workforces. Balancing security and connectivity has never been more challenging.


Read More
shared office space with string lights

56% of companies educate workers on AI risks

Security Staff
November 29, 2023

According to a Kolide report on AI, there is a significant gap between the percentage of employees allowed to use AI and those who actually use it.


Read More
person using laptop

Bots make up 30% of internet traffic

Security Staff
November 28, 2023

According to a recent DataDome report, 68% of U.S. websites are unprotected against bot attacks and traditional CAPTCHAs are no longer effective.


Read More
laptop open to gmail

Phishing makes up 43% of email attacks

Security Staff
November 28, 2023

According to a recent cybersecurity report by Hornetsecurity, there was a 144% increase in email attacks, with phishing making up 43% of attacks.


Read More
digital fingerprint

Digital fatigue is increasing cyber risks in modern workplaces

Security Staff
November 28, 2023

A new report reveals 54% of today’s office workers are ignoring important cybersecurity alerts and warnings due to information overload from digital communication.


Read More
desk next to big window

Scott Metro joins Hazeltree as Chief Information Security Officer

Security Staff
November 28, 2023

Scott Metro has been appointed as Chief Information Security Officer (CISO) at Hazeltree. Scott brings more than 25 years of compliance experience.


Read More
Laptop on table

DHS CISA release joint guidelines for secure AI system development

November 27, 2023

 CISA and the NCSC jointly released Guidelines for Secure AI System Development to help developers of any systems that use AI make informed cybersecurity decisions at every stage of the development process. 


Read More
two people working on same laptop

E-commerce is used a lure for 43% of phishing attacks

Security Staff
November 27, 2023

According to a Kapersky report, there were over 30 million phishing attacks in 2023, increasing during holiday online shopping periods.


Read More
Desktop landline

FTC announces plans to mitigate AI voice fraud

Security Staff
November 24, 2023

The Federal Trade Commission (FTC) has announced plans to better protect consumers from artificial intelligence (AI) voice cloning and fraud.


Read More
handshake

William Wetherill named new DefenseStorm CISO

Security Staff
November 24, 2023

 After nine years, Robert Thibodeaux, DefenseStorm's Chief Information Security Officer (CISO), will retire and William Wetherill will step in as the new CISO.


Read More
Previous 1 2 3 4 5 6 7 8 9 … 580 581 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

Popular Stories

SEC Top Cybersecurity Trends of 2023 header

Top cybersecurity trends of 2023

digital fingerprint

Digital fatigue is increasing cyber risks in modern workplaces

Security AI

The 2023 Annual Guarding Report: Finding the right mix of human and machine

Brown card holder

The holiday season sees a rise in credit card skimming

multicolor text on black screen

29% of organizations cite data loss as top security breach result

SEC AuditBoard webinar

Events

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

October 18, 2023

How to Enhance Corporate Investigations for Mac Computer Forensics

ON DEMAND: Apple Mac computer use is growing in the corporate space. Having the solutions and the knowledge base to respond to events that include Mac computers is just as important as their Windows counterparts.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
LinkedIn

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing