
Security Magazine
-
Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss
Security leaders share their thoughts on the attack, Iran’s potential involvement and the broader implications.
-
Why Most Workplace Violence Prevention Starts Too Late
If your people are running, hiding, or fighting, the prevention window has already closed.
-
2025 Saw a Surge in Wireless Vulnerabilities
Wireless vulnerabilities rose in 2025.
-
Funding Has Limited Security Readiness
Limited security funding opens organizations to threat actors.
-
AI Makes Phishing Scams Harder to Identify in the Workplace
Phishing grows harder to identify in the age of AI.
-
Foxconn Confirms Cyberattack, Security Experts Discuss
Foxconn confirmed a cyberattack has disrupted some of its North American facilities
-
Expert Insights on the West Pharmaceutical Ransomware Attack
West Pharmaceutical Services experienced a ransomware incident.
-
The Bench You'll Need in Three Years Depends on Decisions You Make Now
Today’s hiring shortcut is tomorrow’s talent shortage.
-
What Security Leaders Say About the First AI-Developed Zero-Day Exploit
Security leaders discuss the first AI-created zero-day exploit.
-
Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy
Cybersecurity is no longer a function that can be delegated and reviewed after the fact.
-
Why Security Leaders Need to Move Beyond the Mental Illness Narrative
For mental health awareness month, Brian LeBlanc highlights why security is pivotal to preventing a crisis in the workplace.
-
Top 2026 Security Conferences
Security magazine offers a roundup of security conferences taking place in 2026.
-
Digital Trust and Identity at ISC West
ISC West keynote highlights how gaps across physical access points, digital systems and human processes undermine trust and organizational resilience.
-
AI Will Tell Your Breach Story for the Next Two Years — Day One Decides What It Says
The companies that win the AI-era reputation fight will be the ones whose CISOs and CCOs share a line item, a runbook, and a dashboard.
-
10 Data Breaches to Know About (April 2026)
A roundup of recent data breach stories.
-
Partners in Protection: How to Utilize a Canine Security Force
Organizations of all sizes are looking for innovative ways, including canine teams, to advance their security programs.
-
Research: Microsoft Edge Loads Stored Passwords in Cleartext
A researcher found that Microsoft Edge will load saved passwords into memory in plaintext, even when they are not being used.
-
Will This World Password Day Be the Last?
Passwords have long been an integral part of online security. But this year, some cybersecurity experts are pushing for this to change.
-
Synthetic Identities Are Redefining Trust in Biometric Systems
Standards for identity verification must evolve to address how inputs are introduced, processed and validated before matching occurs.
-
Security Experts Discuss Proposed Government Patching Deadlines
U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing their thoughts.
-
Cybersecurity Professionals Need to Think Like Business Leaders
When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.
-
5 Skills That Will Serve You in Your Security Career
An experienced security consultant shares what she has learned as a corporate security executive and as the CEO of a consulting group.
-
35,000 Users Targeted in Phishing Campaign in Just Two Days
Between the dates of Apr. 14 and Apr. 16, a sophisticated phishing campaign was observed.
-
Exclusive: What the Celebrity Stalkerware Breach Means for Executive Protection
Securitymagazine spoke with Cybersecurity Researcher Jeremiah Fowler about the risks of stalkerware in executive protection.
-
The Art of Security: It Is Time to Rethink the CISO’s Role
The CISO’s role, and the cultural and strategic mindset that influences it, must change.