Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Gaps in Cybersecurity Programs

University of Maryland School of Law Launches Cybersecurity, Homeland Security, Crisis Management Degrees

October 25, 2019
The University of Maryland Francis King Carey School of Law is launching advanced professional training through their online Master of Science (MS) in Cybersecurity Law and Homeland Security and Crisis Management Law.
Read More
Voting2

U.S. House Democrats Pass SHIELD Act to Combat Foreign Interference in Elections

October 24, 2019
The House approved the Stopping Harmful Interference in Elections for a Lasting Democracy (SHIELD) Act that aims to better protect the country's elections from foreign interference. 
Read More
AI-enews

Why Enterprises Cannot Afford to Ignore AI and Emergent Technology in Their Cybersecurity Strategy

Marty Puranik
October 24, 2019
Thanks to advancements in Artificial Intelligence (AI) and Machine Learning (ML) in the area of cybersecurity, small businesses and enterprise-level companies can stay focused and maintain a high level of digital trust from their customers while keeping overhead costs in check.
Read More
Workers Monitor Hurricane Harvey

Arkansas and Oklahoma Share Data Centers to Improve Disaster Recovery Efforts

October 23, 2019
The state of Oklahoma and Arkansas are sharing data centers to improve disaster recovery capabilities.
Read More
attack-cyberenews

Cyberattacks, Application Vulnerabilities Increase by 40 Percent in September 2019

October 23, 2019

In the month of September, there was a 40-percent increase in total cyberattacks compared to August, returning to July levels, according to a Contrast Labs September 2019 AppSec Intelligence Report.


Read More
John McClurg

John McClurg Named BlackBerry CISO

October 23, 2019

BlackBerry Cylance has promoted John McClurg to BlackBerry Chief Information Security Officer (CISO) and Christopher Hummel, BlackBerry Vice President of IT and Business Application Solutions to BlackBerry Chief Information Officer (CIO).


Read More
cyber_lock

The Data Breach Avalanche: What is the Real Reason for Our Crumbling Defenses?

The technology to prevent data breaches exists, yet hackers are still breaking into major organizations with ease. A few best practices will help keep your sensitive data safe.
aman khanna
Aman Khanna
October 23, 2019
The volume and profile of data breaches are not only growing — they’re accelerating. In just one year, from 2018 to 2019, reported breaches jumped 54 percent. The first half of 2019 alone saw more than 4.1 billion compromised records due to hackers and poor security practices.
Read More
Complying with California's Workplace Violence Prevention in Healthcare Rule

Continuous Evaluation Is the Key to Preventing Workplace Violence

Tom Miller
October 22, 2019

Security can take multiple forms. There’s physical security, cybersecurity, and of course, security as it relates to workplace safety. It’s unethical to knowingly put employee and/or client lives on the line. Negligence can cost organizations a pretty penny in court, and especially in the wake of the mass shootings that have occurred in current and former places of employment this year, workplace violence is an issue that can’t be taken lightly.


Read More
ransomware-enews

First Three Quarters of 2019: 7.2 Billion Malware Attacks, 151.9 Million Ransomware Attacks

October 22, 2019
In the first three quarters of 2019, 7.2 billion malware attacks were launched, as well as 151.9 million ransomware attacks, marking 15 percent and five percent year-over-year declines, respectively.
Read More
The 'People' Part of Enterprise Cybersecurity Strategies

Stop the Abuse! (Of Your Cybersecurity Team)

avi chesla
Avi Chesla
October 22, 2019
CCIE’s – analysts with the highest network expert certification – are spending hours a day sifting through network logs, as are Networking experts, Cloud experts, Microsoft OS experts, application experts and other valuable employees.
Read More
Previous 1 2 … 647 648 649 650 651 652 653 654 655 … 720 721 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing