Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Featured Products
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

cyber5-900px.jpg

Four Ways to Achieve a Zero Trust Security Model

Scott Sparvero
Scott Sparvero
January 13, 2020

Put 2019 in the record books — for cybercrime, that is. 


Read More
cyber-threats

NJ Cybersecurity and Communications Integration Cell Predicts New Cyber Threat Landscape in 2020

January 10, 2020
As we begin a new year and decade, the cyber threat landscape presents both existing and new threats, trends and techniques.
Read More
SEC0219-pen-Feat-slide1_900px

Cybercriminals Target Star Wars Fans in Social Engineering Campaign

January 10, 2020
Cybercriminals targeted Star Wars fans in a recent phishing campaign designed to steal credit card data by enticing fans with an early movie screening. 
Read More
SIA logo

SIA Announces Winners of the 2020 SIA RISE Scholarship

January 10, 2020

The Security Industry Association (SIA) has selected five recipients for the 2020 SIA RISE Scholarship, a program offered through SIA’s RISE community of young security professionals that supports the education and career development goals of young industry talent.


Read More
SEC0120-insider-Feat-slide1_900px

Rethinking "Red Flags" - A New Approach to Insider Threats

A whole threat and whole person approach to efficient and effective insider early warning is needed.
val letellier
Val LeTellier
January 10, 2020

Malicious insiders pose an existential threat to any organization. Technical countermeasures only address part of the problem and are increasingly expensive. What are some new approaches to efficient and effective insider threat detection?


Read More
Cyber Insurance Rates, Purchases and Coverage

Developing Comprehensive Cyberinsurance for Tomorrow’s Cities - Today

duncan greatwood
Duncan Greatwood
January 9, 2020

Late last year, it was announced that the major aluminum manufacturing firm, Norsk Hydro AS, received a $3.6 million cyberinsurance payout – the first around highly publicized, extensive cyber breach of March 2019. The large ransomware attack struck the company’s U.S. facilities – before spreading throughout the company, resulting in millions of dollars lost – destabilizing Norsk Hydro’s operations until the summer months. The payout covered merely six percent of the multi-million-dollar costs created by the incident and its aftermath. 


Read More
The Corner Office - july 2018

Cyber Incidents: The Human Factor

mark voses
Marc S. Voses
January 9, 2020
Apparently, we are getting in our own way when it comes to advancing cybersecurity. According to a leading 2018 study by the Ponemon Institute LLC (sponsored by IBM), the three primary causes of data breaches were malicious or criminal attack, system glitch and human error. While the study reports that the length of time to identify and contain, and the cost, were lower for data breaches caused by human error as opposed to the other categories, it is an issue that nearly 27 percent of data breaches are caused by human error.
Read More
SEC0319-Cyber-Feat-slide1_900px

The Evolution of Artificial Intelligence as a System

derek manky
Derek Manky
January 9, 2020
Artificial Intelligence (AI) rests on the verge of transforming both business and society. Financial firm UBS forecasts that next year, the AI market will be worth $12.5 billion due to huge improvements and broader adoption of the technology. And BCG Henderson Institute found that though most leaders have not yet seen significant impact from their AI initiatives, they firmly expect to within the next five years.
Read More
The Cyber 101 Discussion

Google Announce's Project Zero's Full 90-Day Disclosure Policy

January 9, 2020
Google has announced that its Project Zero disclosure guidelines are changing for 2020. 
Read More
Strong Cybersecurity: The Critical Role of Lifecycle Management - Security Magazine

Texas Agencies Seeing 10,000 Attempted Cyber Attacks per Minute From Iran

January 9, 2020
Texas Governor Greg Abbott says that as many as 10,000 attempted attacks per minute from Iran had been detected over the past two days on state agency networks. 
Read More
Previous 1 2 … 565 566 567 568 569 570 571 572 573 … 657 658 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

  • multi-site risk assessment
    Sponsored byAMAROK

    How Multi-Site Risk Assessments Can Guide Your Security Investments Portland Maine to Portland Oregon

  • hybrid cloud security
    Sponsored byRed Hat

    Maximizing business benefits with robust hybrid cloud security

Popular Stories

Credit card and padlock

5M unique credit and debit cards exposed in data breach

Donuts

Security experts respond to Krispy Kreme cyber attack

AI-powered phishing

Combating the rising threat of AI-powered phishing attacks

Water faucet and cup

Internet-exposed HMIs are a risk to water facilities, CISA warns

Monitor with coding

Nearly 400,000 WordPress credentials stolen

Profiles In Excellence

Security Magazine is looking to feature individuals that are showcasing excellence within the security industry!

Events

March 14, 2024

Balancing Act: Navigating Security Tech in Nonprofit Entertainment Sectors

ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security. 

March 19, 2024

Enhance Digital Forensics with Streamlined Analysis and In-Depth Investigations

ON DEMAND: Explore the latest developments in digital forensics with an in-depth look at FTK 8.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing