Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cybersecurity

Articles Tagged with ''cybersecurity''

cyber-threats

Understanding the Convergence Between Online and Real-World Threats

Jon Gonzales
Jon Gonzalez
August 1, 2019
What happens online sometimes manifests as a real-world threat. Real-world threats are typically planned, referenced or originated online. Understanding the convergence between online behavior and real-world actions is increasingly important in the corporate security field. Here’s how security professionals can think about identifying and understanding threats in a society that increasingly straddles the virtual and physical worlds.
Read More
cyber-business

CISO's Communication Breakdown

Dan Holden
Dan Holden
August 1, 2019
The relentless bombardment of cyber-attacks, and the fear of a breach and all that entails, have led to some rather dramatic changes in the Chief Information Security Officer position recently. It has long been considered the corporate hot seat, where job security is a misnomer and the average tenure is less than two years. That may still be true for many, but changes are happening that are finally allowing the CISO to emerge from the shadows of the IT department.
Read More
cybersecurity-blog

Organizations At Risk for Data Breaches: System Vulnerabilities Increase by 92 Percent

August 1, 2019

A new State of The Crowdsourced Security in 2019 study reports a 92 percent increase in total vulnerabilities reported over the previous year.


Read More
mobile

Is Your Enterprise Ready for Mobile Credentials?

Maria Henriquez
August 1, 2019

In a recent study, respondents say that mobile technology enables them to optimize inventory planning and management (96 percent) and point-of-sale (96 percent), personalize the customer experience (96 percent), as well as boost employee productivity and motivation (95 percent).


Read More

More Than 100,000 Students Impacted by Washoe County School District, NV Data Breach

August 1, 2019

The Washoe County School District (WCSD) in Nevada announces a data breach, involving 114,000 students enrolled at WCSD between 2001 and 2016, and "a much smaller number of staff members employed during the same period", says a WCSD press release. 


Read More
shredded-paper

The Importance of Shredding Paper Documents in the Workplace

August 1, 2019

In this digital age you may wonder: who still uses paper in the workplace? Plenty of people.


Read More
digitalization

How Cybersecurity Can Best Support the Digital Enterprise

As companies digitize businesses and automate operations, cyber risks proliferate; here is how the cybersecurity organization can support a secure digital agenda.
James M. Kaplan
James M. Kaplan
Wolf Richter
Wolf Richter Dr.
David Ware
David Ware
August 1, 2019

Two consistent and related themes in enterprise technology have emerged in recent years, both involving rapid and dramatic change. One is the rise of the digital enterprise across sectors and internationally. The second is the need for IT to react quickly and aggressively develop innovations to meet the enterprise’s digital aspirations.


Read More
Encryption Future - Security Magazine

Don't Disarm Individuals in the Battle for Data Protection, Privacy and Security

andrea limbago
Andrea Little Limbago
July 31, 2019

End-to-end encryption provides a foundational data protection safeguard, allowing secure data transfer between the sender and recipient while blocking it from external compromise. It also means this data can be inaccessible to law enforcement, who then must find alternative means to access that data. 


Read More
Airport at Sunset

Hacking Alert Issued for Small Planes

July 31, 2019

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft.


Read More

Study Says Cyber Insurance May Create False Sense of Security

July 31, 2019

Seven in 10 senior financial executives at the world’s largest companies believe their insurer would cover most or all of the losses their company would incur in a cyber attack. Many of the losses they foresee, however, are rarely covered by insurance.


Read More
Previous 1 2 … 75 76 77 78 79 80 81 82 83 … 103 104 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing