Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • Annual Guarding Report
    • The Security Leadership Issue
    • Women in Security
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
  • SIGN UP!
Home » Keywords: » hacker

Items Tagged with 'hacker'

ARTICLES

Person in hoodie on laptop

North Korean hacker tries to access KnowBe4, security leaders react

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
August 1, 2024

Security leaders share their insights on the North Korean hacker that nearly infiltrated KnowBe4. 


Read More
Black keyboard with blue letters

Patelco announces ransomware attack

Security Staff
July 8, 2024

Patelco Credit Union announced that on June 29, 2024, the company faced a ransomware attack. Hackers gained access to its systems and blocked access.


Read More
football

Super Bowl security tips for planning corporate security strategy

Ilia Sotnikov
Ilia Sotnikov
February 8, 2024

Like sporting events organizers, corporate teams can benefit from implementing core ideas from big event security into their own security strategy. 


Read More
generative AI
Education & Training

Balancing data privacy and security in the age of AI-powered defenses

As much as AI can do to supplement cybersecurity measures, one of the most effective ways to stay ahead of evolving hacking trends is collaboration.
Kelly McCracken photo
Kelly McCracken
January 11, 2024

As much as AI can do to supplement cybersecurity measures, one of the most effective ways to stay ahead of evolving hacking trends is collaboration.


Read More
Justin Shattuck 5 minutes with logo
5 Minutes With

How to build cyber resilience in a rapidly evolving threat landscape

Rachelle BlairFrasier
Rachelle Blair-Frasier
December 20, 2023

The ransomware landscape is ever evolving and it can seem as though there is a new headline about a breach, extortion demand or fallout after an attack every day. But how can security leaders build cyber resilience? 


Read More
Infrastructure

When humans are the weak link in critical infrastructure cybersecurity

Irfan Shakeel
September 6, 2023

In the growing digital world, cybersecurity has become more important than ever. The human element can often be a challenging, constant problem.


Read More
Microphone

What security leaders can learn from Smashing Pumpkins hacker attack

Rachelle BlairFrasier
Rachelle Blair-Frasier
June 6, 2023

While stealing music from a band might not be equal to obtaining and releasing customer personal information, there are still lessons to learn from this incident.


Read More
Holden
Special Report

Alex Holden - Top Cybersecurity Leaders 2023

Founder and Chief Information Security Officer, Hold Security
Madeline Lauver
March 1, 2023

Alex Holden uses actionable threat intelligence to identify some of the world’s largest data breaches and unearth ransomware collective operations.


Read More
Hacker can't enter system

Reducing dwell time of threat actors requires a reactive workforce

Julian Zottl
February 21, 2023

Organizations need to be properly equipped to respond as quickly as possible to reduce how long an attacker has access to sensitive data.


Read More
Computer with a lock

How attackers are pairing MFA manipulation & social engineering tricks

Sinan Eren
February 15, 2023

The right combination of training, security policies & zero trust technology can provide protection from any credential-based attack vector.


Read More
More Articles Tagged with 'hacker'
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Lowes
    Sponsored byAxis

    Modernizing Retail Technology Operations to Improve Business Efficiency

  • Threat management
    Sponsored bySeerist

    Polycrises are Exhausting Your Security Team: Tips to Navigate the Challenges

  • image of electric security gate by AMAROK
    Sponsored byAMAROK

    Redefining Security: Proactive Measures Transform Industrial Protection

Popular Stories

Coding on monitor

Windows users targeted with zero-day attacks via Internet Explorer

Empty hospital room

McLaren Health Care experienced a criminal cyber attack

Person in hoodie on laptop

North Korean hacker tries to access KnowBe4, security leaders react

Two cellphones

Security leaders respond to the AT&T data breach

Doctor holding stethoscope

Security leaders respond to HealthEquity data breach

Profiles In Excellence

Security Magazine is looking to feature individuals that are showcasing excellence within the security industry!

Events

March 14, 2024

Balancing Act: Navigating Security Tech in Nonprofit Entertainment Sectors

ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security. 

March 19, 2024

Enhance Digital Forensics with Streamlined Analysis and In-Depth Investigations

ON DEMAND: Explore the latest developments in digital forensics with an in-depth look at FTK 8.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Secutiy Podcasts

Where security and risk professionals stay up to date on the latest issues affecting the enterprise.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey And Sample
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2024. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing