Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Authors » Jordyn Alger

Articles by Jordyn Alger

Person with it up numbers on them

6 Google Chrome Extensions Expose User Information

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 10, 2025

Research reveals 6 widely used Google Chrome extensions unintentionally transmit user data over simple HTTP.


Read More
Red fibers

Vulnerability Impacts Various Cloud Deployments of Cisco ISE

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 9, 2025

A Cisco vulnerability could affect cloud deployments of Cisco Identity Services Engine (ISE) in certain systems. 


Read More
Red mobile phone

IT Support Impersonated in Voice Phishing Campaign

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 6, 2025

An observed voice phishing campaign is impersonating IT support workers. 


Read More
Cloud icon

71% of Organizations Cannot Cover the Cloud Environment With Current Tools

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 6, 2025

As cloud infrastructure increases in complexity, security teams are having difficulty keeping pace. 


Read More
Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 5, 2025

Harrods, Marks & Spencer, Adidas and more — why are retailers facing this wave of cyberattacks in recent months? 


Read More
Google search screen

2 Certificate Authorities Now Distrusted by Google — Due to Compliance Issues

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 5, 2025

Security leaders share their thoughts on the importance of compliance and trust for certificate authorities.



Read More
Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 2, 2025

Victoria’s Secret took down its United States website after a security incident.


Read More
Doctor

Serviceaide Data Leak Impacts Nearly 500,000 Catholic Health Patients

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
May 30, 2025

Security leaders discuss the Serviceaide data leak, which impacted around 500,000 Catholic Health patients. 


Read More
Gears on keyboard

What the LockBit Data Breach Reveals About Its Inner Workings

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
May 29, 2025

What does the LockBit data breach reveal about the group’s inner workings?


Read More
Adidas shoes

Adidas Confirms Data Breach, Security Leaders Weigh In

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
May 29, 2025

Security leaders discuss the implications of the Adidas data breach.


Read More
Previous 1 2 3 4 5 6 7 8 9 … 26 27 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing