Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • Annual Guarding Report
    • The Security Leadership Issue
    • Women in Security
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
  • SIGN UP!
Home » Topics » Cybersecurity » Cybersecurity News

Cybersecurity News
Cybersecurity News RSS Feed RSS

Generic Image for Cyber Security

The 5 Top Ways to Carry Out a Successful Breach Notification

October 11, 2011
The process of notifying affected populations in the event of a data breach is complex and littered with potential land mines – handled poorly, the notification can be a black eye for an organization and potentially open them up to regulatory fines or sanctions. Brian Lapidus and his team at Kroll have assembled the following advice for businesses to help them minimize their risk and simplify what has become a very challenging process.
Read More
Generic Image for Cyber Security

Hackers May Target Cars Next

September 7, 2011

The increasingly sophisticated systems running a car may lead to new vulnerabilities, according to a study from security software provider McAfee in partnership with mobile software provider Wind River and embedded security provider Escrypt. Those systems could allow hackers to take control of the car, track its location, and even access devices that are connected to it, including smartphones and tablets carrying valuable personal data.


Read More
Old Newswire Feature Image

Sony Hires New Security Executive

September 7, 2011

Sony Corp. has hired a former U.S. Department of Homeland Security official as its new top security executive.


Read More
Exclusives Feature Image

Are Tablet Devices Secure for Businesses?

Oleksak Headshot
Joe Oleksak
August 23, 2011
The number of tablet owners continues to soar, making it difficult for manufacturers to keep up with demand. New tablet owners are increasingly business users, particularly within industries such as retail, banking, and healthcare. Estimates indicate that 25 percent of tablet sales in 2011 will be made by enterprises, leading some to call 2011 the year of the enterprise tablet. All estimations aside, a tablet’s ability to provide mobility and flexibility is irrefutable, and businesses are noticing. But can tablets be deployed in an enterprise without sacrificing security?
Read More
Exclusives Feature Image

The ABCs on PCI

Sean Bruton
August 23, 2011
Security breaches can cost organizations millions of dollars, and those costs could be followed by lawsuits, insurance claims, and hefty fines. Just as important are the devastating effects on company reputation and customer trust that could extend far into the future. A 2008 study by the Ponemon Institute, which researches information security policy and data protection, found that after a breach of credit card data businesses lose 31% of their customers.
Read More
Exclusives Feature Image

Safety in the Cloud - Best Practices for Private and Public Models

Lucas Roh
August 8, 2011
With market analysis firm International Data Corporation (IDC) predicting $72.9 billion in cloud-related revenues by 2015, the cloud as the preferred storage and application environment is the future. Additionally, the IDC study indicates that by 2015, spending on public cloud services will account for nearly half of the net new growth in overall IT spending. This spending includes money spent on application development and deployment, infrastructure, storage, and servers.
Read More
Diane Ritchey

You Breach, You Pay?

diane-2016-200.jpg
Diane Ritchey
August 1, 2011

There is no shortage of news stories dealing with cybercrime and data breaches. From Citigroup admitting that computer hackers breached the bank’s network and accessed the data of about 200,000 bank card holders in North America, to the huge data breach at Sony and its Playstation Network, it’s all over the news. 


Read More
Exclusives Feature Image

5 Ways to Safely Destroy a Hard Drive

Responsible Hard-Drive Destruction — Let’s Get Real
Andrew Kelleher
July 26, 2011
It’s no secret that our computer hard drives contain a lot of things we’d rather keep secret. Because the information security field is my home turf, I’m troubled by some of the loose talk I hear about how to destroy used drives. There is a whole lot of bad advice online, especially.
Read More
Exclusives Feature Image

The Multi-Layered Approach: 4 Ways to Secure Your IT Assets

Stephen Midgley
July 12, 2011
When it comes to preventing the loss and theft of mobile assets within the enterprise, there is no one-stop-shop security solution. However, the need has never been greater as mobile devices become more prevalent and hold more sensitive data.
Read More
IT article feature

Return of the Phone Phreakers: Business Communications Security in the Age of IP

Adam Boone
April 1, 2011

Virtually every telecom manager in business today has received the pitch: “Cut your telecom trunking costs by 50 percent. Improve your business communications flexibility...


Read More
Previous 1 2 … 609 610 611 612 613 614 615 616 617 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Lowes
    Sponsored byAxis

    Modernizing Retail Technology Operations to Improve Business Efficiency

  • Threat management
    Sponsored bySeerist

    Polycrises are Exhausting Your Security Team: Tips to Navigate the Challenges

  • image of electric security gate by AMAROK
    Sponsored byAMAROK

    Redefining Security: Proactive Measures Transform Industrial Protection

Popular Stories

Coding on monitor

Windows users targeted with zero-day attacks via Internet Explorer

Empty hospital room

McLaren Health Care experienced a criminal cyber attack

Person in hoodie on laptop

North Korean hacker tries to access KnowBe4, security leaders react

Two cellphones

Security leaders respond to the AT&T data breach

Doctor holding stethoscope

Security leaders respond to HealthEquity data breach

Profiles In Excellence

Security Magazine is looking to feature individuals that are showcasing excellence within the security industry!

Events

March 14, 2024

Balancing Act: Navigating Security Tech in Nonprofit Entertainment Sectors

ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security. 

March 19, 2024

Enhance Digital Forensics with Streamlined Analysis and In-Depth Investigations

ON DEMAND: Explore the latest developments in digital forensics with an in-depth look at FTK 8.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Secutiy Podcasts

Where security and risk professionals stay up to date on the latest issues affecting the enterprise.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey And Sample
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2024. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing