Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

Michigan School is First to Offer Cybersecurity Education

December 9, 2016

Pinckney Community Schools in Pinckney, MI are the first district in the nation to create a cyber defense education program.


Read More
Integrates Tested Tools for Network Monitoring and Security

Integrates Tested Tools for Network Monitoring and Security

IntellaStore II from APCON
December 1, 2016

In order to help enterprise cybersecurity leaders reduce the amount of time spent integrating threat management and monitoring solutions, this solution provides application testing to add proven tool options to IntellaStore II for security, analysis, forensics, or network and application performance monitoring.


Read More
Simulates Attacks on Networks to Test Responses, Security Levels

Simulates Attacks on Networks to Test Responses, Security Levels

Red Team from NTT Security
December 1, 2016

This network penetration testing service simulates attacks on networks as they might occur in the real world.


Read More
Cybersecurity Intrusion Detection

Why 'Low Severity' Vulnerabilities Can Still Be 'High Risk'

The Hazards of Focusing Only on Fixing 'High' and 'Critical' Severity Vulnerabilities
Christopher Camejo
November 22, 2016

It’s not that fixing Critical and High-Severity vulnerabilities is the problem; it’s that the Medium and Low severity vulnerabilities can pose significant risks as well. For any given vulnerability, we need to distinguish between its severity and the risk that results from it being present on a particular system on our network.


Read More
cyber6-900px.jpg

Duplicate Alerts Draining Security Analysts' Time

New research shows that 30 percent of analysts' manpower is lost to duplicate alerts.
Garry Fatakhov Yair Stern
November 22, 2016

Essentially, one-third of analysts’ time is being spent on processing alerts that have unknowingly already been processed, and at present SOC teams are left with little ability to make this distinction resulting in massive manpower drain. 


Read More
security predictions, crystal ball

Cyberattack Predictions: Are We Getting Them Right?

Eric Basu
November 8, 2016

In 2015, it seemed no one was safe from hackers. The year began with Sony reeling from a hack that put the studio and celebrities such as Seth Rogen and James Franco in a web of geopolitics and extortion. Seven months later came the high-profile Ashley Madison hack, which resulted in the release of the email and physical addresses for 37 million users. Cybercriminals stole $1 billion from banks in 30 countries as part of the Carbanak hack. Even the Director of the CIA wasn’t safe – his AOL email account was hacked by someone claiming to be a high school student.


Read More
supply chain images

7 Strategies to Defend Against Supply Chain Risks in the Digital Era

Javvad Malik
November 8, 2016

Even brick and mortar companies are increasingly leveraging the internet and cloud services to expand their business. As traditional business models have changed to incorporate these resources, the security risks presented have evolved as well. In today’s world of digital business, the security risks faced by the majority of companies have largely shifted into the cyber realm. 


Read More

Top 5 Fails from Companies Preparing for and Responding to a Data Breach

Michael Bruemmer
Michael Bruemmer
November 8, 2016

Being adequately prepared to respond to a data breach is an ever-changing game – new threats are emerging, new regulations are being put into place and companies must regularly re-evaluate their response plans to ensure they are applicable to today’s threat landscape. Unfortunately, many companies are not reviewing and updating their plans frequently enough – in fact, only 25 percent of companies say they update their response plans once or twice a year. Not to mention that no matter how well prepared and updated a company’s plan is, an actual live breach response can present unforeseen challenges that cause companies to stumble. 


Read More
Email, Spymail, Cybersecurity, Cyber espionage

4 Ways to Thwart Social Engineering Attacks

Social engineering attacks are on the rise. Here's what your organization can do to stop them.
Paul Everton
October 25, 2016

Cyber criminals are now using sophisticated social engineering techniques to target employees and trick them into handing over funds and divulging sensitive corporate data. Luckily there are a number of steps organizations can take to protect themselves and their employees from this increasingly popular and successful form of threat.


Read More
Doorway to Cybersecurity

Unified Access Control: A Cyber Game-Changer

Scott Sieracki
October 25, 2016

As the age of the Internet is hitting a crescendo, cyber vulnerability is no longer a growing concern; it is a reality most businesses will face in the near future without adequate network protection.


Read More
Previous 1 2 … 728 729 730 731 732 733 734 735 736 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing