Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

hospital-sign-enews

Alabama's DCH Health System Paid Ransomware for Decryption Key

October 7, 2019

Alabama's DCH Health System chose to pay ransom after hackers disrupted their computer systems and threatened to shutdown their services. 


Read More
social media

U.S. Department of Justice Asks Facebook Not to Implement End-to-End Encryption

October 7, 2019
The Department of Justice published an open letter to Facebook from international law enforcement partners from the United States, United Kingdom and Australia in response to the company’s publicly announced plans to implement end-to-end-encryption across its messaging services.
Read More
socialmedia1-900px.jpg

Facebook, Instagram Introduce "Threads," Reportedly Designed With Privacy in Mind

October 4, 2019
Facebook has announced it will introduce a new feature to its Instagram application: "Threads."
Read More

Ellie Mae’s Selim Aissi Named Cybersecurity Breakthrough Awards CISO of the Year

October 4, 2019

Selim Aissi, Ellie Mae's Chief Security Officer, has been selected CISO of the Year.


Read More
Dr. Eman El-Sheikh

UWF Cybersecurity Director Appointed to Florida Cybersecurity Task Force

October 4, 2019

Dr. Eman El-Sheikh, director of the University of West Florida Center for Cybersecurity, will serve on the newly established Florida Cybersecurity Task Force.


Read More
CCPA

State Privacy Regulations Are Long Overdue: How Can Companies Prepare?

dominic sartorio
Dominic Sartorio
October 3, 2019
For a long time, it may have seemed like consumers virtually had no power, and that businesses could do anything they want with individuals’ private information with nearly no repercussions – but that time is rapidly expiring. With increased state regulations, it is clear that businesses must step up their security game by pseudonymizing their data, rendering the data unidentifiable, so when that data travels across state lines and organizational boundaries, the data is still protected, as well as the business and its reputation.
Read More
data-enews

Too Dangerous to Be Ignored: Cybersecurity Trends that Affect Everyone

brian bertacini
Brian Bertacini
October 3, 2019

Today, the average American leaves the house with a smartphone that has more computing power than the systems that landed humans on the moon. The Internet of Things (IoT) enables refrigerators to tell you that you’re running out of milk and cars to provide assisted driving. The reality is that the knowledge economy is in full swing, and the modern world’s relationship with technology has advanced to a state where nearly all aspects of our daily lives are touched by the internet. 


Read More
AI-enews

Enterprise-Wide Risk Management: Bridging Physical and Cyber Protection

Tim Willis
Tim Willis
October 3, 2019

As threats from the cyber and physical realms become increasingly prevalent and complex, enterprise security teams must arm themselves with an integrated approach to security operations—one that incorporates cybersecurity, physical security and advanced technologies such as artificial intelligence (AI) and machine learning.


Read More
cyber5-900px.jpg

ISA and European Directors Partner to Create a Pan-European Culture of Cybersecurity

October 3, 2019

The Internet Security Alliance (ISA) and The European Confederation of Directors’ Associations (ecoDa) announced a partnership to develop a handbook on cyber-risk management for European corporate boards of directors.


Read More
Here, a CDC healthcare worker takes the proper measurements to ensure that she is protected in an Ebola clinic in West Africa - Security Magazine

Don’t Forget Biological Threats

Daniil Davydoff
Daniil Davydoff
October 3, 2019

From the standpoint of risk analysis, recency bias—that is, an overwhelming focus on events that have happened most recently—is one of the most nefarious psychological blinders.


Read More
Previous 1 2 … 659 660 661 662 663 664 665 666 667 … 728 729 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing