Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

The Top 12 Practices of Secure Coding - Cyber Tactics - Security Magazine

SMB Budget Constraints and Increase of Cyberattacks in 2020 Among Top Cybersecurity Concerns

January 23, 2020
What are some current trends and barriers that Channel Partners face when protecting clients against emerging threats?
Read More

Front Rush, Recruiting Software Company, Exposes 700,000 Student Athletes' Files

January 23, 2020
Front Rush confirmed that they suffered a data breach exposing roughly 700,000 student athletes’ files.
Read More
SEC1019-edu-Feat-slide1_900px

THSuite, POS System in Cannabis Industry, Leaks 85,000 Files

January 22, 2020
THSuite, a point-of-sale system in the cannabis industry, has exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S.
Read More
How the Security Operations Center Can Create Customer Confidence

New Research Finds Half of SOCs are Ineffective

January 22, 2020

New survey data suggests that a new way of looking at SOC management is overdue.


Read More
Computer

Proposed Legislation Would Establish Cybersecurity Coordinator in Every State

January 21, 2020

U.S. Senators John Cornyn (R-TX) and Rob Portman (R-OH) introduced a bipartisan bill to require the Department of Homeland Security to establish a Cybersecurity State Coordinator program.


Read More
GDPR: Will Your Company Be Fine or Fined? - Security Magazine

GDPR Update: More Than 160,000 Data Breach Notifications Reports

January 21, 2020
Data protection regulators have imposed $126 million (EUR114 million) in fines under the GDPR regime for a wide range of GDPR infringements, not just for data breaches. 
Read More
Unprepared Companies Vulnerable to Ransomware Attacks

N.Y. Senator Carlucci Introduces Bill That Prohibits Paying Ransom

January 21, 2020
New York Senator David Carlucci introduced Senate Bill S7289 that would ban the paying of ransom.
Read More
Simulates Attacks on Networks to Test Responses, Security Levels

City of New Orleans Will Take Months to Recover From Cyber Attack

January 21, 2020

The City of New Orleans, La. says the recent cyber attack on its networks will cost more than seven million dollars.


Read More

Hacker Publishes Telnet Credentials for More Than 515,000 Servers, Routers, IoT Devices

January 20, 2020
A hacker has published a list of Telnet credentials for more than 515,000 servers, home routers and IoT (Internet of Things) "smart" devices.
Read More
finance3-900px.jpg

Tax Themed Phishing Attack Targeting ADP Users

January 20, 2020
A tax themed email phishing campaign is targeting ADP users. 
Read More
Previous 1 2 … 628 629 630 631 632 633 634 635 636 … 724 725 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing