Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » hacking

Articles Tagged with ''hacking''

researcher uses IoT medical device

Top 5 healthcare cybersecurity threats — and how to mitigate them

Security Staff
March 11, 2022

The 2021 Healthcare Data Breach Trend Report from Protected Harbor gives insight into evolving healthcare data breach patterns, predictive threats for 2022, and a playbook on how to increase information technology (IT) durability to stop future healthcare data attacks.



Read More
cctv

How containerization bolsters video surveillance security

John Rezzonico
February 22, 2022

Video surveillance and video management systems (VMS) are cornerstones of enterprise security, but with the advent of IP cameras, they can also open up organizations to cybersecurity risks. Containerization may mitigate these risks.


Read More
electronic scooter

6 security risks of electronic scooters

February 21, 2022

Electronic scooters have been found to have multiple physical security and cybersecurity risks, according to research and analysis from Which? and NCC Group, an IT security firm.


Read More
encrypted data

4 ways Encryption as a Service can aid enterprise security

Maxim Dressler
February 11, 2022

Enterprise cybersecurity leaders can help mitigate the effects of a data breach through data encryption. Encryption as a Service can give cyber professionals an efficient way to secure their data.


Read More
hacking-freepik1170x658.jpg

SANS holiday hack challenge adds in log4j bonus challenge

Maria Henriquez
December 22, 2021

The SANS Institute has announced the addition of a log4j security vulnerability bonus challenge to the 2021 SANS Holiday Hack Challenge. 


Read More
tom-claes-G8EfpFaGBWM-unsplash-copy.jpg

Five new trends in healthcare cybersecurity

Madeline Lauver
October 27, 2021

Defending the medical device supply chain, cracking down on ransomware and monitoring new technology are all priorities for cybersecurity professionals in the healthcare field. In a panel hosted by BD, Eric Decker, William Landry, Inhel Rekik and Scott Shindledecker discuss top of mind issues for healthcare cybersecurity professionals.


Read More
SANS_Technology_Institute_Ed_Skoudis-copy.jpg

Ed Skoudis named President of SANS Technology Institute

October 22, 2021

Ed Skoudis, a cybersecurity leader and educator, has been named the new President of the SANS Technology Institute, according to a statement. Ed will lead the institute's degree programs and Internet Storm Center.


Read More
iPhone

Find the balance between security and privacy in a BYOD world

Patrick Harr
September 16, 2021

Given the growth of BYOD over the past year or so, security professionals must review their current endpoint security strategies.


Read More
security plan freepik

US and Australian law enforcement hack into app to read millions of encrypted messages to disrupt organized crime internationally

June 9, 2021
The US Federal Bureau of Investigation (FBI), the Dutch National Police (Politie), and the Swedish Police Authority (Polisen), in cooperation with the US Drug Enforcement Administration (DEA) and 16 other countries have carried out with the support of Europol one of the largest and most sophisticated law enforcement operations to date in the fight against encrypted criminal activities.  
Read More
email security

30,000 U.S. organizations breached by cyber espionage group Hafnium

March 9, 2021
At least 30,000 organizations in the U.S. have been hacked by a Chinese cyber espionage unit, known as "Hafnium." The group is targeting and exploiting security vulnerabilities in Microsoft Exchange Server email software. 
Read More
Previous 1 2 3 4 5 6 7 8 9 … 12 13 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing