Security Magazine
-
From Farm to Table: Securing the Future of Agriculture with Innovative Technology
A look at the critical role security plays in keeping today’s agriculture industry strong.
-
Cybersecurity Trust Gaps: Why Stakeholders Believe Hackers Before They Believe You
The companies that endure will be those that fight for credibility as fiercely as they defend their networks.
-
The Future of Cybersecurity Training and What It Means for Employers
Traditional cyber educational models are struggling to keep up with the pace of change.
-
Protecting Critical Infrastructure With Limited Funding
In this episode of Lock It Down with Security Magazine, Associate Editor Taelor Sutherland speaks with Chetrice Romero, a senior cybersecurity advisor at Ice Miller.
-
Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response
Most organizations today aren’t short on alerts. The real problem is what comes next.
-
The Prevention Partnership: Executive Protection & Behavioral Threat Teams
Real protection starts long before the threat gets close, and that’s where the other half of the equation comes in.
-
The Power of Mentorship in Shaping Security
Top security leaders share how mentorship shaped their paths to success.
-
Cyber Risks Can Be Legal Risks: How to Protect the Organization
Attorneys share their insights about the legal considerations organizations should be aware of when it comes to AI, third party relationships and BYOD policies.
-
Navigating the U.S. Department of Labor’s Health Plan Cybersecurity Guidance
Earlier this year the U.S. Department of Labor (DOL) broadened its cybersecurity guidance to cover all employee benefit plans, including health plans.
-
When Hospital Security Becomes Personal
Hospital security isn’t really about technology — it’s about trust.
-
AI, Compliance, and a New Era of Cybersecurity
Artificial intelligence has greatly transformed how organizations ensure cybersecurity compliance.
-
Building Bridges: Overcoming Silos to Bring Organizations to the Next Level
Poor visibility can leave organizations vulnerable, which is why it is time for companies to bridge internal silos.
-
145,000 Healthcare Records Exposed
A database in the healthcare industry was exposed.
-
US Government Shutdown Begins October 1, 2025
The U.S. government has shut down as of 12:01 am on October 1, 2025.
-
3 Ways to Bolster Security This Cybersecurity Awareness Month
While improving cybersecurity is a year-round initiative, this month serves as an excellent opportunity for organizations to reorient their security priorities.
-
Cybersecurity Awareness Month Is a Reminder: Phishing Prevention Is Year-Round
Cybersecurity Awareness Month reminds organizations to make recognizing and reporting phishing a priority, but it’s not a once-a-year effort.
-
Zero Trust at 15: The Strategy That Refused To Become a Product
For the 15th anniversary of zero trust, the founder of the zero trust model shares his insights.
-
WestJet Notifies American Consumers of Data Breach
WestJet, an Alberta Partnership and Canadian commercial airline headquartered in Calgary, Alberta has notified United States residents of a recent cybersecurity incident that may affect certain individuals' personal information.
-
Agentic AI: Benefits, Risks and Best Practices for Implementation
Security magazine talks with Diana Kelley, Chief Information Security Officer (CISO) at Noma Security, about the benefits, risks, and best practices of agentic AI.
-
The BCP Proving Ground: A Blueprint for a Successful Test
Test the BCP to ensure the process is organized, insightful and strengthens crisis response capabilities.
-
What Can Security Leaders Learn from Charlie Kirk’s Shooting?
The killing of Charlie Kirk shocked the nation, and many leaders are sharing their thoughts from the perspective of event security and executive protection.
-
5M Records Exposed, Leaking Sensitive Auto Insurance Data
More than 5 million records were exposed in an online database.
-
Preparing for a Quantum Future
In this episode of Lock It Down with Security Magazine, Director of Digital Security Solutions Marketing at Entrust Samantha Mabey discusses how organizations can prepare for a quantum future.
-
Disabling Hospital HVAC Is Now a Bargaining Chip in Ransomware
Shutting down a hospital’s heating and cooling system would be a patient safety disaster.
-
First Line of Defense: The Role of Modern VMS in Supercharging Investigations
Whether it’s a security breach, theft, or an unauthorized access attempt, physical security teams must act quickly to determine what happened, who was involved, and what actions to take next.