Security Magazine

Keep up to date on the latest news and information posted to Securitymagazine.com with our RSS feed.
  1. Default security configurations, weak passwords and human error are the top vectors for cyberattackers targeting enterprise networks. Penetration testers share how to avoid these cyber risks.

  2. The Federal Trade Commission will be exploring rules to crack down on lax data security and harmful commercial surveillance. 

  3. For chief information security officers (CISOs) and their organizations, the question is not if the cybersecurity budget should be cut. It's how much risk they are willing to take.

  4. Chief information security officers (CISOs) must be early adopters and explore emerging cyber technology if they hope to keep ahead of cybercriminals.

  5. Maine has begun implementing a 988 mental health crisis response line with support from Mission Critical Partners (MCP). Learn more in this case study.


  6. Employee monitoring needs to be approached correctly. Too often, poorly constructed plans, bad communication and unreasonable expectations get in the way of a successful implementation. 

  7. Risk management executive Dr. John McMahon has joined Grambling State University (GSU) as the new Director of Safety and Risk Management.


  8. Understanding how bad actors recruit and develop employees to share information can allow security leaders to harden their organizations against the threat of social engineering.

  9. The Cybersecurity and Infrastructure Security Agency (CISA) released a catalog of free services and tools available for state and local election officials to improve the cybersecurity and resilience of their infrastructure.

  10. WKS Restaurant Group (WKS) relies on remote video monitoring to offer enhanced security for its employees and customers.

  11. Let's explore two top identity-based attacks — phishing and third-party accounts — and ways organizations can implement cybersecurity best practices to defend against these.

  12. Email security threats are increasing, according to the H2 2022 Email Threat Report from Abnormal Security.

  13. Austin Siders has been named Chief Information Officer (CIO) at the University of Southern Indiana, where he will lead tech and cybersecurity efforts.

  14. Cybersecurity leaders need to focus on fourth-party risks to their software supply chain. Are your vendors (and their partners) exposing you to risk?


  15. Christine Whichard, new Chief Information Security Officer (CISO) at SmartBear, has been an instrumental leader in the company’s cybersecurity plans, including an overhaul of its Information Security program.

  16. Security sits down with Meg West, X-Force Cybersecurity Incident Response Consultant at IBM, to answer reader questions about enterprise cybersecurity insights, burnout and more in a new podcast episode.

  17. Let's examine nine different categories of threats against the metaverse and inside the metaverse, including cyber-physical crime, financial fraud, legal implications and more, according to Trend Micro.

  18. To meet the security issues of today, organizations must now shift to object-based backup storage. 

  19. Election observers from the European Parliament and other international organizations were protected by close protection officers and security technology from G4S during the 2022 Lebanon election.

  20. Web3 is coming — what will that mean for enterprise security? This blockchain-based version of the internet may present new cybersecurity challenges.

  21. Investigative techniques can help shift security teams from an organizational cost center to a value add.

  22. Franchise organizations have different levels of cyber risk to consider when it comes to identity and access management (IAM) practices.

  23. Office communication platform Slack has admitted to accidentally exposing the hashed passwords of some users. 

  24. 3.4 billion phishing attacks are raining on us every day. With summer now upon us, it seems that everyone is on vacation. Here are three tips to get your business ready for phishing season.

  25. School districts in New Jersey must implement policies to establish threat assessment teams at each school in the state by the 2023/2024 school year.