Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

attack-cyberenews

T-Mobile's Data Breach Exposes Customer's Data and Financial Information

March 6, 2020
Mobile telecommunication company T-Mobile US, Inc. has revealed that a data breach on its systems that compromised some of its customers’ personal information. 
Read More
Face mask pandemic

Coronavirus: Global Deaths Could Reach 15 Million

March 6, 2020

New research from The Australian National University (ANU) discusses seven scenarios in how the coronavirus could affect the global economy, including the number of people who could die from the virus. 


Read More
Roland Cloutier

Roland Cloutier Joins TikTok as CISO

March 6, 2020

TikTok announced that cybersecurity expert and security industry veteran Roland Cloutier will join the company as CISO.


Read More
hacker

Why Ethical Hacking? (The What and Why of Ethical Hacking)

reut hackmon
Reut Hackmon
March 5, 2020

Most people do not know that ethical hackers are people who are hired to think like a hacker or bad actor. They meticulously probe a company's systems to find any weaknesses and bring them to the attention of the business before the bad actors exploit them. Ethical hacking is an investment that companies in the modern world can't afford to do without.  


Read More
The Long and Winding Road to Cyber Recovery

New Report: A Profile into Kilos, New Search Engine for the Dark Web

March 5, 2020
Why is Kilos - a new cybercriminal engine - quickly becoming popular, and what are the threats that security researchers and operations team face with Kilos? 
Read More
CCPA

Cybersecurity Response to the California Consumer Privacy Act

armistead whitney
Armistead Whitney
March 5, 2020

2020 is here and companies that fall under the California Consumer Privacy Act (CCPA) requirements need to take immediate actionable steps now. Non-compliant businesses will not only face hefty fees but potentially adverse impacts to their brand, a loss of customers and negative PR. What are three tips to ensure your enterprise complies with the CCPA?


Read More
cruise

Cruise Operator Carnival Corporation Discloses Cyber Attack

March 5, 2020
Two units of cruise operator Carnival Corp. disclosed that they were the targets of a cyber attack, which they identified in May 2019. 
Read More
Revised NIST Cyber Security Framework - Security Magazine

Access Control: Don’t Give Cybercriminals the Keys to Your Business

Despina Stamatelos
March 5, 2020
The use of IP-based access control solutions to manage employee comings and goings has dramatically increased in recent years. The Internet of Things (IoT) has added connectivity to an abundance of devices that better facilitate access which has users – and potential users – rightfully concerned about the security of these newer technologies.
Read More
Steve Pugh

Steve Pugh Named Chief Security Officer at Twilio

March 5, 2020

Steve Pugh joined has joined Twilio as its chief security officer to lead the company’s global trust and security team responsible for corporate, physical and cybersecurity.


Read More
jeff franklin

Jeff Franklin Named Chief Cybersecurity Officer for Iowa's Secretary of State’s Office

March 5, 2020

Jeff Franklin, who served as the State of Iowa’s Chief Information Security Officer for the past 10 years, has been named Iowa's Chief Cybersecurity Officer.


Read More
Previous 1 2 … 603 604 605 606 607 608 609 610 611 … 713 714 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing