
Security Magazine
-
Synthetic Identities Are Redefining Trust in Biometric Systems
Standards for identity verification must evolve to address how inputs are introduced, processed and validated before matching occurs.
-
Security Experts Discuss Proposed Government Patching Deadlines
U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing their thoughts.
-
Cybersecurity Professionals Need to Think Like Business Leaders
When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.
-
5 Skills That Will Serve You in Your Security Career
An experienced security consultant shares what she has learned as a corporate security executive and as the CEO of a consulting group.
-
35,000 Users Targeted in Phishing Campaign in Just Two Days
Between the dates of Apr. 14 and Apr. 16, a sophisticated phishing campaign was observed.
-
Exclusive: What the Celebrity Stalkerware Breach Means for Executive Protection
Securitymagazine spoke with Cybersecurity Researcher Jeremiah Fowler about the risks of stalkerware in executive protection.
-
The Art of Security: It Is Time to Rethink the CISO’s Role
The CISO’s role, and the cultural and strategic mindset that influences it, must change.
-
Sandhills Medical Foundation Notified Individuals of a May 2025 Data Breach
Individuals were recently notified of a ransomware attack affecting Sandhills Medical Foundation that occurred in May 2025.
-
The Coming Wave of Large-Scale Al-Enabled Cyberattacks
The first truly major AI-enabled cyberattack will look different from the incidents that dominate headlines today.
-
Cybersecurity Professionals Sentenced to Prison for Ransomware Attacks
Two cybersecurity professionals were imprisoned for their role in a string of 2023 ransomware attacks.
-
Instructure, Parent of Canvas, Confirms Data Breach
Instructure recently confirmed its data was stolen.
-
Inside the Modern Warehouse: Securing the World’s New Front Door
Through perimeter protection, layered safety measures and systemic security, security leaders can protect an essential element of the supply chain: warehouses.
-
Company Database Deleted by AI Agent: What Security Leaders Need to Know
Nine seconds — that’s how long it took for an AI agent to delete a company’s production database and volume-level backups.
-
The Browser Blind Spot Your Privacy Program Is Missing
Most privacy programs still have one gap in common: the browser.
-
12 Tips for Building an Effective Security Budget
Alan Saquella, CPP, shares 12 tips for building a strong security budget.
-
New Research: AI-Driven Cybercrime Led to a 389% Increase in Ransomware Victims
An overview of cyber threat trends from the previous year.
-
Building Public/Private Partnerships That Actually Move the Needle
Public and private sector partnerships strengthen security at every level.
-
Connected Security: How Proactive Real-Time Tech Keeps Security Workers Safe
New technologies are allowing companies to take more proactive approaches and monitor vulnerable employees.
-
Ransomware Responsible for 90% of Manufacturing Cyber Losses
When ransomware attacks affect the sector, the losses are significant.
-
Protecting U.S. Critical Infrastructure as Global Tensions Rise
Security leader discusses protecting critical infrastructure as geopolitical tensions grow.
-
Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare
What healthcare security leaders need to know about de-escalation training.
-
Less Than 10% of Higher Education Has No Intention of Adopting AI
The majority of universities have either adopted AI or intend to soon.
-
2025 Saw Fewer Healthcare Breaches Than 2024
2025 healthcare breaches dropped from 2024
-
What the Medtronic Breach Means for Security Experts
Security experts are sharing their insights on the broader implications of this breach.
-
Why Energy Infrastructure Is Cybersecurity’s Next Frontier
Energy infrastructure represents cybersecurity’s next frontier because it changes the scope and speed at which risks evolve.