Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

cyberwarfare defense illustration
credit card fraud

mobile malware

Just say no to Facebook quizzes

Clickbait by any other name is just the same. These quizzes take your personal information, and leave with cookies and malware.

coal power station

Engineering firm exposes SCIF plans and power vulnerability reports

Chris Vickery, director of cyber risk research at UpGuard, Inc., says that a misconfigured Rsync server maintained by Power Quality Engineering, Inc. (PQE) exposed client information pertaining to critical infrastructure for the City...

build freelance tech worker team teambuilding

Separation of duties and IT security

Muddied responsibilities create unwanted risk and conflicts of interest. New regulations such as GDPR now require that you pay more attention to roles and duties on your security team.

industrial iot

10 emerging ICS and IIoT cybersecurity companies to watch

Keep an eye on these companies in the growing Industrial Control Systems (ICS) and Industrial Internet-of-Things (IIoT) security market.

sort filter sift flour separate bake

The road to APIness in customer identity

Ditching the identity platform for a universal identity API approach. Using API recipes to build the identity ecosystem moving away from the static platform designs, to a world where identity and data components truly come together...

hacking critical infrastructure security

Choose preparation over fear to protect critical infrastructure

Patrick Dennis lines up for a Security Slap Shot on the need to stop using FUD and start making better preparations to protect critical infrastructure.

red team vs. blue team

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

messaging apps threats security privacy thought bubbles

Can Shakespeare solve our messaging app crisis?

The messaging app Telegram announced earlier this week it was stepping up its efforts to thwart terrorism communication. A college literature professor may have the perfect solution for the problem.

Anonymized identity

The thorny issue of verifying humans

Customer identity access management and how verification of users is not working. A look at the concept of levels of assurance (LOA) as an integer based system that needs a rethink. How probability based identity is the way forward....

snow globe security

Increased cyber awareness must lead to equivalent action

Recent ransomware attacks underscore the importance of a unified global response.

nuclear power plant

Global cyber reconnaissance against the energy sector

Media blares that our nuclear plants are compromised. Media is wrong. Again.

New reality of ransomware attacks spikes FUD in cybersecurity

Cyber attacks and ransomware are in the news, raising fear of a digital Pearl Harbor.

Davis-Besse Power Station in Oak Harbor, Ohio

Inside the rickety, vulnerable systems that run just about every power plant

A security expert's warning: We're using Windows XP for a lot of awfully important things and hoping for the best.

woman shouting into bullhorn

Who cares about smart city security?

There is a fierce debate raging over smart city security, with one side fueling the hype while the other conjures nightmare scenarios. The trouble is that the debate is silent, siloed and unproductive.

pacemaker xray

Medical devices at risk: 5 capabilities that invite danger

It isn't just certain connected medical devices that put patient data and physical safety at risk, it's specific capabilities and systems within which they operate that make them a broad, and vulnerable, attack surface.

coal power station

Critical Infrastructure Protection (CIP): Security problems exist despite compliance

CIP is just one of 14 mandatory NERC standards that are subject to enforcement in the U.S. However, it gets a good deal of attention because this regulation is centered around the cybersecurity of assets deemed to be critical to the...

chinese espionage

U.S. defense contractor arrested for giving U.S. secrets to Chinese operatives

Kevin Mallory, a U.S. defense contractor, was arrested for allegedly passing secret and top secret U.S. documents to Chinese intelligence.

telephone operators 1952

Developer uses code to get revenge on tech support and IRS scammers

Tech support and IRS scams have become as common as random emails proclaiming that you've won the lottery, or emails from prince in some foreign land who wants to share their wealth. One potential victim used a bit of code to take...

Load More
You Might Also Like