- CISA 2015 Closes in on Expiration, Security Leaders Share Concernsby algerj@bnpmedia.com (Jordyn Alger) on September 19, 2025 at 7:00 am
What happens if the Cybersecurity Information Sharing Act of 2015 expires? Security leaders share their concerns.
- Time to Embrace Offensive Security for True Resilienceon September 18, 2025 at 6:31 pm
Cybercriminals are using artificial intelligence to quickly discover network vulnerabilities, create polymorphic malware, and improve advanced […]
- Political Violence in America: Turning Point or Flashpoint?on September 18, 2025 at 8:00 am
Are we approaching a turning point in political violence? For security professionals, the challenge is not to get swept away in media-driven panic […]
- How AI and Virtual Operators Are Transforming Security Operationson September 17, 2025 at 1:00 pm
In this episode of Lock It Down with Security Magazine, Simon Morgan, Chief Product Officer at SureView Systems, discusses the evolution of security […]
- Did Scattered Spider Scatter? Cyber Experts Are Skepticalby algerj@bnpmedia.com (Jordyn Alger) on September 17, 2025 at 12:00 pm
At least 15 ransomware gangs have announced retirement, but security leaders aren’t convinced.
- Reading, Heeding, and Leadingon September 17, 2025 at 4:00 am
A practical book list for those who practice security, risk management and leadership.
- Security Leaders Discuss Restaurant Brands International’s Vulnerabilitiesby algerj@bnpmedia.com (Jordyn Alger) on September 16, 2025 at 4:00 pm
According to research from two ethical hackers, Restaurant Brands International (RBI) has security flaws that could enable a malicious actor to […]
- U.S. Senator Calls for Investigation of Microsoftby algerj@bnpmedia.com (Jordyn Alger) on September 16, 2025 at 7:00 am
U.S. Senator Ron Wyden (D-OR) has called for an investigation of Microsoft, claiming the company’s insecure software has enabled cyber threats.
- When the Breach Isn’t Yours but the Headline Is: Managing Association Riskon September 15, 2025 at 4:00 pm
When an attack hits one organization, the ripple effects can quickly spread across industries, partners, and professional associations. In many […]
- In an Age of Cyber Risk, Digital Transformation is No Longer Optionalon September 15, 2025 at 4:00 am
Concerns that outdated legacy systems could be leaving firms vulnerable to mounting cyber risks are driving a wave of technology spending in the […]
- Unlocking Security Talent: Questions HR Should Ask and What Their Answers Revealby jerry@smrgroup.com (Jerry J. Brennan) on September 15, 2025 at 4:00 am
Properly screening candidates is key to the successful hire of your next security leader.
- Charlie Kirk’s Shooting Exposes Event Security Gaps, Increasing Political Violence Threatby algerj@bnpmedia.com (Jordyn Alger) on September 12, 2025 at 4:00 pm
The shooting of Charlie Kirk reveals concerning realities about event security and political violence.
- Russian Offensive Cyber Operations: Analyzing Putin’s Foreign Policy Actionsby algerj@bnpmedia.com (Jordyn Alger) on September 12, 2025 at 7:00 am
The broad strokes of what cybersecurity leaders need to know about Putin’s foreign policy actions.
- Zero Trust vs. Adaptive Identity: What CISOs Are Getting Wrongon September 12, 2025 at 4:00 am
- 1.6M Calls and Voicemails Exposed Onlineon September 11, 2025 at 4:00 pm
1.6 million audio files were exposed.
- Navigating Data Security in Financial Services: Lessons from the TeleMessage Breachon September 11, 2025 at 1:00 pm
The breach at TeleMessage highlighted significant vulnerabilities within the financial industry’s communications infrastructure.
- 3 Major K-12 Cyber Risks and How to Mitigate Themby algerj@bnpmedia.com (Jordyn Alger) on September 11, 2025 at 7:00 am
Cyber experts share 3 major threats to school cybersecurity and provide advice for managing these risks.
- Critical Steps to Strengthening Satellite Network Securityon September 11, 2025 at 4:00 am
Satellite networks are integral to myriad aspects of modern society, providing essential services that support both civilian and military operations.
- 2B Weekly Downloads at Risk: Supply Chain Attack Targets Popular npm Packages, Security Leaders Discussby algerj@bnpmedia.com (Jordyn Alger) on September 10, 2025 at 4:00 pm
18 popular packages with a total of 2 billion weekly downloads were targeted in an attack.
- Best Practices for Security in the Hospitality Industryon September 10, 2025 at 2:00 pm
By investing in integrated security solutions and fostering a culture of awareness and preparedness, hospitality businesses can protect what matters […]
- Georgia Hospital Notifies 160K Individuals of Breach 1 Year After Incidentby algerj@bnpmedia.com (Jordyn Alger) on September 10, 2025 at 7:00 am
A Georgia hospital experienced a data breach on May 30, 2024, but notified affected consumers on August 27, 2025.
- How AI-Driven PIAM+ Unlocks Predictive Intelligence for the Modern Enterpriseon September 10, 2025 at 4:00 am
AI-powered PIAM+ helps security teams stay ahead, not just keep up.
ITComposer
Work Smarter ~ Not Harder