Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Authors » Jordyn Alger

Articles by Jordyn Alger

Donuts

Krispy Kreme Data Breach Update: 160,000 Individuals Affected

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 23, 2025

The time frame between the breach and the notice of affected individuals has some cyber experts concerned. 


Read More
Computer with binary code hovering nearby

Vulnerability in Public Repository Could Enable Hijacked LLM Responses

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 20, 2025

Research reveals a CVSS 8.8 vulnerability, and security leaders are sharing their thoughts. 


Read More
Scania truck

Transport Solution Company Scania Confirms Cybersecurity Incident

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 19, 2025

Scania, a transport solution organization, has confirmed it faced a cybersecurity incident. 


Read More
Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 19, 2025

Scattered Spider, who is believed to be responsible for several cyberattacks against the retail sector in recent months, has apparently shifted targets to the insurance sector. 


Read More
5 Minutes with Bhavsar
5 Minutes With

How Critical Infrastructure Is Becoming the First AI Trust Battleground

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 18, 2025

Security magazine talks with Vrajesh Bhavsar, CEO of Operant, about the importance of infrastructure-level protection. 


Read More
Laptop

New Research: Multi-Stage Malware Attack on Python Package Index Discovered

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 18, 2025

Researchers have discovered that the Python Package Index (PyPI) has a malicious package in its repository.


Read More
The Washington Post newspaper

Washington Post Journalists Targeted in Cyberattack

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 17, 2025

The Washington Post was the subject of a cyberattack. 


Read More
Coding

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 16, 2025

The Fog ransomware group utilizes an uncommon toolset, including open-source pentesting utilities and an employee monitoring software. 


Read More
Security camera

40,000 IoT Security Cameras Are Exposed Online

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 13, 2025

Research shows that more than 40,000 security cameras across the globe are exposed to the internet. 


Read More
Wall of produce

Security Leaders Discuss the Whole Foods Distributor Cyberattack

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 12, 2025

Security leaders discuss the Whole Foods distributor cyberattack, with insights on attacker motivations as well as risk mitigation strategies.  


Read More
Previous 1 2 3 4 5 6 7 8 9 … 26 27 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing