Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

cyber 3 responsive default

China’s New Cybersecurity Law Comes into Force in June

Kylie Bull
May 22, 2017

The new cybersecurity law enables the Chinese government to take measures to “monitor, defend and handle cybersecurity risks and threats originating from within the country or overseas sources, protecting key information infrastructure from attack, intrusion, disturbance and damage.”


Read More
cyber6-900px.jpg

International Operations Target Cybercrime Networks in Asia and Europe

Kylie Bull
May 22, 2017

An operation targeting cybercrime across Asia has resulted in the identification of nearly 9,000 Command and Control servers and hundreds of compromised websites, including government portals.


Read More
Security newswire default

74 Countries Hit by Massive Wave of Ransomware

May 12, 2017

Security researchers have recorded more than 45,000 cases of ransomware in the past 10 hours alone, most of which are taking advantage of a Microsoft vulnerability. 


Read More
Security newswire default

New Executive Order Changes Cybersecurity Requirements for Federal Agencies

May 11, 2017

U.S. President Donald Trump signed an executive order today to bolster the government’s cybersecurity and protect critical infrastructure from cyberattacks. 


Read More
Been Hacked? Let That Be a Lesson to You

Been Hacked? Let That Be a Lesson to You

Chabinsky-2016-200px.jpg
Steven Chabinsky
May 1, 2017

If at first you don’t succeed, try, try again.” Although catchy, we all know that the real keys to success after failure are reflection and adaptation, not mere persistence.


Read More
ASIS 2017 Program Bolstered by InfoSec Partnerships

ASIS 2017 Program Bolstered by InfoSec Partnerships

May 1, 2017

ASIS and the Information Systems Security Association (ISSA), a global organization of information security professionals and practitioners, have signed an event partnership that will see ISSA fully integrated into the ASIS Annual Seminar and Exhibits (ASIS 2017) taking place 25-28 September in Dallas.


Read More
Mobile Devices and Malware

Cybercrime, Malware Shift to Mobile Devices

May 1, 2017

Cybercrime is quickly shifting to the mobile space as mobile device malware infections reached an all-time high in 2016.


Read More
Russia and Cyberattacks

Debunking the 5 Myths of Sophisticated Cyber Attacks

Stop Blaming China & Russia for All Your Cyber Attacks
Joseph Carson Amar Singh
April 6, 2017

It might be a more exciting story to claim a nation-state pilfered your data, but the more likely scenario is that your enterprise failed at some of the most basic tenets of cybersecurity hygiene, leaving the door open to script kiddies and opportunitistic hackers to run rampant in your system. Join us as we debunk 5 major data breach myths. 


Read More
hacking automobiles

Evolving Cybersecurity Threat Landscape Shifts Hiring Patterns Toward Specialization

Chris Camacho
April 6, 2017

While the shortage of cybersecurity staff continues, many enterprises are now looking for less volume and for more specialization.Companies need specialists who are well-versed in the threats aimed at the business's environment.


Read More
Cybersecurity Insurance

How to Shop for a Cyber Insurance Policy

Anita Sathe
April 6, 2017

To select the most comprehensive yet affordable cyber insurance plan for your business, it’s critical to first identify who is accessing your confidential data and how they’re accessing it, as this information will largely dictate how your cyber insurance policy is outlined. Ensure your effective policy includes these six key components. 


Read More
Previous 1 2 … 684 685 686 687 688 689 690 691 692 693 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing