Security Magazine

Security Magazine company information, Employees & Contact Information

Security Magazine is the leading source for enterprise security news, trends and strategies. For more than 50 years, we’ve served as the go-to resource for security executives navigating today’s complex and rapidly evolving risk landscape. From cybersecurity and risk management to leadership and operational resilience, we deliver in-depth reporting, expert insights, and real-world metrics that help security professionals make informed decisions and drive their organizations forward. Join our community of global security leaders. Visit www.SecurityMagazine.com for breaking news, exclusive reports, thought leadership, webinars, and more!
Looking for a particular Security Magazine employee's phone or email?

Security Magazine Questions

News

$18B Is the Cost of Violence for Hospitals - Security Magazine

$18B Is the Cost of Violence for Hospitals Security Magazine

Securing Healthcare: Safeguarding Patient Care and Privacy Through Agile Cyber Strategies - Security Magazine

Securing Healthcare: Safeguarding Patient Care and Privacy Through Agile Cyber Strategies Security Magazine

AI-powered, automated attacks have reached record numbers - Security Magazine

AI-powered, automated attacks have reached record numbers Security Magazine

How To Enact Meaningful Change This International Women in Cyber Day - Security Magazine

How To Enact Meaningful Change This International Women in Cyber Day Security Magazine

Upskilling security teams: Breaking down silos and elevating expertise - Security Magazine

Upskilling security teams: Breaking down silos and elevating expertise Security Magazine

Agentic AI: Benefits, Risks and Best Practices for Implementation - Security Magazine

Agentic AI: Benefits, Risks and Best Practices for Implementation Security Magazine

The Important Role of Automated Notification Systems in an Effective Security Solution - Security Magazine

The Important Role of Automated Notification Systems in an Effective Security Solution Security Magazine

Deepfake Scam or Inside Job? Rethinking the BEC Threat - Security Magazine

Deepfake Scam or Inside Job? Rethinking the BEC Threat Security Magazine

Cyber Independence: Why True Risk Analysis Requires Unbiased Assessments - Security Magazine

Cyber Independence: Why True Risk Analysis Requires Unbiased Assessments Security Magazine

Deepfake-enabled fraud caused more than $200 million in losses - Security Magazine

Deepfake-enabled fraud caused more than $200 million in losses Security Magazine

85% of Organizations Approach Cybersecurity Reactively - Security Magazine

85% of Organizations Approach Cybersecurity Reactively Security Magazine

Critical Software Vulnerabilities Rose 37% in 2024 - Security Magazine

Critical Software Vulnerabilities Rose 37% in 2024 Security Magazine

What Every Business Needs To Know About Multi-Factor Authentication - Security Magazine

What Every Business Needs To Know About Multi-Factor Authentication Security Magazine

The Truth Is Always in the Code: Why Security Starts With Visibility - Security Magazine

The Truth Is Always in the Code: Why Security Starts With Visibility Security Magazine

Social Engineering Attacks: What You Need to Know - Security Magazine

Social Engineering Attacks: What You Need to Know Security Magazine

Why red teaming matters even more when AI starts setting its own agenda - Security Magazine

Why red teaming matters even more when AI starts setting its own agenda Security Magazine

40,000 IoT Security Cameras Are Exposed Online - Security Magazine

40,000 IoT Security Cameras Are Exposed Online Security Magazine

Why every business needs a cybersecurity communications strategy - Security Magazine

Why every business needs a cybersecurity communications strategy Security Magazine

82% of all phishing emails utilized AI - Security Magazine

82% of all phishing emails utilized AI Security Magazine

Who’s driving ransomware’s accelerated growth in 2025 - Security Magazine

Who’s driving ransomware’s accelerated growth in 2025 Security Magazine

78% of Security Leaders Say Tool Sprawl Challenges Threat Mitigation - Security Magazine

78% of Security Leaders Say Tool Sprawl Challenges Threat Mitigation Security Magazine

Top challenge for 57% of end users is outdated physical security or IT - Security Magazine

Top challenge for 57% of end users is outdated physical security or IT Security Magazine

Brand impersonation is 51% of browser phishing attempts - Security Magazine

Brand impersonation is 51% of browser phishing attempts Security Magazine

Ensuring Safety on the Move: Strengthening Security in Public Transportation - Security Magazine

Ensuring Safety on the Move: Strengthening Security in Public Transportation Security Magazine

Average Cyber Budget Reaches 5 Year Low, CISOs Discuss - Security Magazine

Average Cyber Budget Reaches 5 Year Low, CISOs Discuss Security Magazine

Frontline lessons: What cybersecurity leaders can learn from attacks - Security Magazine

Frontline lessons: What cybersecurity leaders can learn from attacks Security Magazine

The new standard in facility protection: Enhancing perimeter security - Security Magazine

The new standard in facility protection: Enhancing perimeter security Security Magazine

Big events, bigger risks: How teams keep large events safe - Security Magazine

Big events, bigger risks: How teams keep large events safe Security Magazine

Out of Office for Summer? Cybercriminals Are Just Getting Started - Security Magazine

Out of Office for Summer? Cybercriminals Are Just Getting Started Security Magazine

The Oracle breach and the case for transparent cyber response - Security Magazine

The Oracle breach and the case for transparent cyber response Security Magazine

How higher education can protect student data from cyber siege - Security Magazine

How higher education can protect student data from cyber siege Security Magazine

CISA’s Reset Delays Action as Mobile Spyware Surges - Security Magazine

CISA’s Reset Delays Action as Mobile Spyware Surges Security Magazine

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts - Security Magazine

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts Security Magazine

Advanced Security Strategies in High-Threat Environments - Security Magazine

Advanced Security Strategies in High-Threat Environments Security Magazine

AI Introduces Security Vulnerabilities Within Code in 45% of Cases - Security Magazine

AI Introduces Security Vulnerabilities Within Code in 45% of Cases Security Magazine

Better Together: How MFA and Strong Password Practices Can Help Bolster Security - Security Magazine

Better Together: How MFA and Strong Password Practices Can Help Bolster Security Security Magazine

Transport Solution Company Scania Confirms Cybersecurity Incident - Security Magazine

Transport Solution Company Scania Confirms Cybersecurity Incident Security Magazine

47% of Manufacturing Breaches in 2024 Involved Ransomware - Security Magazine

47% of Manufacturing Breaches in 2024 Involved Ransomware Security Magazine

Chaim Mazal — Growing into a Security Career - Security Magazine

Chaim Mazal — Growing into a Security Career Security Magazine

Ransomware Statistics: Updates on Ransoms, Attacks and Active Groups - Security Magazine

Ransomware Statistics: Updates on Ransoms, Attacks and Active Groups Security Magazine

Game-day defense: Next-gen threat protection for sporting events - Security Magazine

Game-day defense: Next-gen threat protection for sporting events Security Magazine

Hacktivism Increasingly Targeting Critical Infrastructure - Security Magazine

Hacktivism Increasingly Targeting Critical Infrastructure Security Magazine

Credential Harvesting Becomes Top Retail Data Threat - Security Magazine

Credential Harvesting Becomes Top Retail Data Threat Security Magazine

AI overhaul at McDonald’s needs a super-sized security approach - Security Magazine

AI overhaul at McDonald’s needs a super-sized security approach Security Magazine

Safeguarding Intellectual Property: A Strategic Imperative for Organizations - Security Magazine

Safeguarding Intellectual Property: A Strategic Imperative for Organizations Security Magazine

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI - Security Magazine

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI Security Magazine

Cybersecurity’s gender issue: Why women are kept out of leadership - Security Magazine

Cybersecurity’s gender issue: Why women are kept out of leadership Security Magazine

Security’s 2025 Women in Security - Security Magazine

Security’s 2025 Women in Security Security Magazine

84% of Organizations Are Now Using AI in the Cloud - Security Magazine

84% of Organizations Are Now Using AI in the Cloud Security Magazine

Why SIEM’s obituary was written too soon - Security Magazine

Why SIEM’s obituary was written too soon Security Magazine

Victoria’s Secret Security Incident Shuts Down Website - Security Magazine

Victoria’s Secret Security Incident Shuts Down Website Security Magazine

Open source software vulnerabilities found in 86% of codebases - Security Magazine

Open source software vulnerabilities found in 86% of codebases Security Magazine

Will deepfake threats undermine cybersecurity in 2025? - Security Magazine

Will deepfake threats undermine cybersecurity in 2025? Security Magazine

The Critical Role of Mean Time to Remediate - Security Magazine

The Critical Role of Mean Time to Remediate Security Magazine

Why data protection is non-negotiable for every business - Security Magazine

Why data protection is non-negotiable for every business Security Magazine

Survey: Parking lot safety influences holiday shopping habits - Security Magazine

Survey: Parking lot safety influences holiday shopping habits Security Magazine

61M Records Listed for Sale Online, Allegedly Belong to Verizon - Security Magazine

61M Records Listed for Sale Online, Allegedly Belong to Verizon Security Magazine

5 aviation principles that elevate technical support leadership - Security Magazine

5 aviation principles that elevate technical support leadership Security Magazine

Update on Marks & Spencer Cyberattack - Security Magazine

Update on Marks & Spencer Cyberattack Security Magazine

WhatsApp Banned on US House of Representatives Devices - Security Magazine

WhatsApp Banned on US House of Representatives Devices Security Magazine

Rooted mobile devices are 250 times more vulnerable - Security Magazine

Rooted mobile devices are 250 times more vulnerable Security Magazine

State of ransomware: Evolving threats and strategies to stay safe - Security Magazine

State of ransomware: Evolving threats and strategies to stay safe Security Magazine

AI Emerges as the Top Concern for Security Leaders - Security Magazine

AI Emerges as the Top Concern for Security Leaders Security Magazine

US agencies and defense contractors infected with infostealing malware - Security Magazine

US agencies and defense contractors infected with infostealing malware Security Magazine

Governance in the Age of Citizen Developers and AI - Security Magazine

Governance in the Age of Citizen Developers and AI Security Magazine

Threat Actor Targeting Indian Defense Sector - Security Magazine

Threat Actor Targeting Indian Defense Sector Security Magazine

The 2024 Annual Guarding Report: Navigating the Changing Weather - Security Magazine

The 2024 Annual Guarding Report: Navigating the Changing Weather Security Magazine

Security leaders respond to the dismissal of NSA director - Security Magazine

Security leaders respond to the dismissal of NSA director Security Magazine

Recognizing cybersecurity as a revenue growth strategy - Security Magazine

Recognizing cybersecurity as a revenue growth strategy Security Magazine

The hidden costs of outdated security - Security Magazine

The hidden costs of outdated security Security Magazine

Medical Express Ambulance Inc. announces data breach - Security Magazine

Medical Express Ambulance Inc. announces data breach Security Magazine

Laboratory Services Cooperative experienced a cybersecurity incident - Security Magazine

Laboratory Services Cooperative experienced a cybersecurity incident Security Magazine

2025 ISC West Product Preview - Security Magazine

2025 ISC West Product Preview Security Magazine

DeepSeek can develop malware, cyber experts are sharing the risks - Security Magazine

DeepSeek can develop malware, cyber experts are sharing the risks Security Magazine

CISO strategies: Modern challenges and how to overcome them - Security Magazine

CISO strategies: Modern challenges and how to overcome them Security Magazine

Oxford University Launches Its First MBA Cyber Resilience Elective - Security Magazine

Oxford University Launches Its First MBA Cyber Resilience Elective Security Magazine

Why consumers don’t take cybersecurity threats seriously - Security Magazine

Why consumers don’t take cybersecurity threats seriously Security Magazine

A critical challenge: Understanding and addressing insider threats - Security Magazine

A critical challenge: Understanding and addressing insider threats Security Magazine

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds - Security Magazine

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds Security Magazine

The fundamentals of cybersecurity in the age of AI - Security Magazine

The fundamentals of cybersecurity in the age of AI Security Magazine

Ransomware incidents increase by 132%, vishing by 1,633% - Security Magazine

Ransomware incidents increase by 132%, vishing by 1,633% Security Magazine

Hackers see schools as easy targets — It’s time to change that - Security Magazine

Hackers see schools as easy targets — It’s time to change that Security Magazine

From Chaos to Control: The Power of Immutable Backups in Disaster Scenarios - Security Magazine

From Chaos to Control: The Power of Immutable Backups in Disaster Scenarios Security Magazine

32% of Employees Using AI Hide It From Their Employer - Security Magazine

32% of Employees Using AI Hide It From Their Employer Security Magazine

Phishing campaign leverages Microsoft 365 infrastructure for attacks - Security Magazine

Phishing campaign leverages Microsoft 365 infrastructure for attacks Security Magazine

Cybersecurity experts discuss the YouTube CEO deepfake - Security Magazine

Cybersecurity experts discuss the YouTube CEO deepfake Security Magazine

Notable physical security trends of 2024 - Security Magazine

Notable physical security trends of 2024 Security Magazine

Protecting organizations: Password smarter, not harder - Security Magazine

Protecting organizations: Password smarter, not harder Security Magazine

Cybersecurity recommendations for the Trump administration - Security Magazine

Cybersecurity recommendations for the Trump administration Security Magazine

Speed vs. security: The truth about weapons detection systems - Security Magazine

Speed vs. security: The truth about weapons detection systems Security Magazine

67% of organizations experience a certificate-related outage monthly - Security Magazine

67% of organizations experience a certificate-related outage monthly Security Magazine

Commvault Command Center has a critical security flaw - Security Magazine

Commvault Command Center has a critical security flaw Security Magazine

88% of organizations are increasing fraud team headcounts - Security Magazine

88% of organizations are increasing fraud team headcounts Security Magazine

Cybersecurity experts share how AI could enhance tax-related scams - Security Magazine

Cybersecurity experts share how AI could enhance tax-related scams Security Magazine

Trump administration dismisses Cyber Safety Review Board (CSRB) - Security Magazine

Trump administration dismisses Cyber Safety Review Board (CSRB) Security Magazine

Mobile phishing threats are evolving, according to new research - Security Magazine

Mobile phishing threats are evolving, according to new research Security Magazine

Lawsuit Alleges Roblox Tracks Children’s Data Without Parental Consent - Security Magazine

Lawsuit Alleges Roblox Tracks Children’s Data Without Parental Consent Security Magazine

Chief Executive Officers, accountability and hidden violations - Security Magazine

Chief Executive Officers, accountability and hidden violations Security Magazine

The critical need for secure communications in modern law enforcement - Security Magazine

The critical need for secure communications in modern law enforcement Security Magazine

Data breaches: Preventing and responding - Security Magazine

Data breaches: Preventing and responding Security Magazine

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant