This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Security Newswire

ISC East Keynote Speakers Announced

November 5, 2019
Security and public safety leaders Deanne Criswell, commissioner of the New York City Emergency Management Department, and Angela Stubblefield, deputy associate administrator for security and hazardoues materials safety at the Federal Aviation Administration (FAA), will headline the 2019 SIA Education@ISC East Keynote Series.
Read More
cyber threat

AsusWRT and Amazon Alexa Products Compromised in Data Breach

November 5, 2019

AsusWRT, a web-based app from Asus that allows users to manage their WiFi network and works with smart devices, such as Amazon Alexa products, has been compromised in a data breach, giving hackers access to an user's home network and the ability to hijack smart devices.


Read More
It's Time to Change Your Perception of the Cybersecurity Professional

NATO to Update Cybersecurity Services and Systems

November 5, 2019

The NATO Communications and Information Agency released a Request for Quotation valued at 20 million EUR to refresh NATO's cybersecurity services.


Read More
SEC1119-500Profile4-slide4_900px

Ken Harr: Protecting the Citizens

Sarah Ludwig Rausch
November 5, 2019
“No two days are ever the same,” says Ken Harr, Corporate Director Safety, Security & Emergency Management for Ballad Health, when asked what he enjoys about his role.
Read More
SEC1119-500Profile3-slide3_900px

William Chedester: Third-Generation Protection

Sarah Ludwig Rausch
November 5, 2019

Not only does a law enforcement pedigree run in W.P. Chedester’s family, he’s the third generation of his family to work in the police department at West Virginia University (WVU) located in Morgantown, a small city in north-central West Virginia.


Read More
Cybersecurity Metrics for the C-Suite

Number of Data Breach Reports Skyrocket in Canada Since Privacy Law Came Into Effect

November 4, 2019
Since November 1st, 2018, The Office of the Privacy Commissioner of Canada has received 680 security breach reports, which is six times the volume received during the same period one year earlier.
Read More
Cybersecurity Education

N.J. Cybersecurity Awareness Poster Contest Announced

November 4, 2019
The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) invites public, private and home-schooled students in grades kindergarten through twelfth to participate in the state of New Jersey’s annual Cybersecurity Awareness poster contest.
Read More
Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

Healthcare Data Breaches Will Cost $4 Billion by Year's End

November 4, 2019
According to new research, 96 percent of IT professionals agreed that data attackers are outpacing their medical enterprises, holding providers at a disadvantage in responding to vulnerabilities.
Read More
SEC1119-500Profile2-slide2_900px

Eileen Behr: Serving University Students

Sarah Ludwig Rausch
November 4, 2019

Beginning her career as a municipal police department dispatcher, Eileen Behr worked her way through various divisions and assignments over the course of 32 years – including accident and traffic, tactical negotiator, juvenile, investigations and emergency management coordinator – to eventually become the first female police chief in Montgomery County, Pennsylvania. After the sudden death of the Montgomery County sheriff in 2011, Behr was appointed sheriff.


Read More
SEC1119-500Method-Feature-slide_900px

The 2019 Security 500 Methodology

November 1, 2019

The Security 500 tracks 20 vertical markets and collects unique data where appropriate (such as number of unique facilities in healthcare) and applies this data to key metrics.


Read More
Previous 1 2 … 431 432 433 434 435 436 437 438 439 … 508 509 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

2023 Top cyber security leaders

Security's 2023 Top Cybersecurity Leaders

CT scanner

Cybersecurity threats to medical devices are a growing concern

Empty conference room

Cyber risk is a business risk

laptop phone.jpg

31% of organizations had users fall for phishing attack

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing