Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Jeff Whitaker

Jeff Whitaker Named Chief Information Officer at Eastern Kentucky University

May 22, 2020
Jeff Whitaker was named Eastern Kentucky University’s Chief Information Officer, the University announced. 
Read More
Joyce Hunter

Joyce Hunter Appointed Executive Director of the Institute for Critical Infrastructure Technology

May 22, 2020
The Institute for Critical Infrastructure Technology (ICIT), a nonprofit cybersecurity and technology think tank, named Joyce Hunter as Executive Director.
Read More
remote work

Facebook Announces Permanent Remote Work Option for Employees

May 22, 2020
Facebook CEO Mark Zuckerberg announced that the company will allow permanent remote work for many of its existing employees. 
Read More
building

Four Reasons to Integrate Security Early in Design: Safety, Savings, Aesthetics & Support

Ryan T. Searles
Ryan T. Searles
May 22, 2020
When we do a risk assessment, we evaluate the facility’s needs and identify any gaps in their physical security barriers and policies and procedures. Why should you integrate security early in the design process?
Read More
Revised NIST Cyber Security Framework - Security Magazine

New Malware Variant Can Steal Data from Browsers and Cryptocurrency Wallets

May 21, 2020
A Reason Labs research team has discovered a new variant of the Raccoon malware family. Initially discovered back in 2019, the Raccoon malware family is used to steal confidential data and browser information.
Read More
SEC0719-Cyber-Feat-slide1_900px

70% of Organizations to Increase Cybersecurity Spending Following COVID-19 Pandemic

May 21, 2020
With coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the value of increasing their investments in cybersecurity solutions. 
Read More
Software-as-a-Service

FIRST Updates Coordination Principles for Multi-Party Vulnerability Coordination and Disclosure

May 21, 2020
The Forum of Incident Response and Security Teams (FIRST) has released an updated set of coordination principles – Guidelines for Multi-Party Vulnerability Coordination and Disclosure version 1.1.
Read More
The Cyber 101 Discussion

Navigating the Unknown: Lessons Learned in the Full-Scale Transition to Remote Work

Ian Pitt
Ian Pitt
May 21, 2020
Many weeks have passed since organizations around the globe closed their physical doors and transitioned to full-scale remote work. This ‘new normal,’ as many are calling it now, has brought upon countless changes for IT teams.
Read More
Shirley Erp

Shirley Erp Named Chief Information Security Officer for the City of Austin, Texas

May 20, 2020

The city of Austin, Texas has named Shirley Erp as its Chief Information Security Officer (CISO).


Read More
Cyber data breach

192 Million Records Leaked by Natura & Co., Brazilian Online Retailer

May 20, 2020
The security team at Safety Detectives, currently led by Anurag Sen, discovered a significant data breach, including personally identifiable information, belonging to Brazilian retailer Natura & Co. 
Read More
Previous 1 2 … 587 588 589 590 591 592 593 594 595 … 728 729 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing