Physical Security

Physical Security news, information, and how-to advice

Small businesses could benefit from wireless industry 'kill switch' plans

Participants like Apple, AT&T, Google, and Verizon Wireless agree to provide "baseline anti-theft tool"


The worst data breaches of 2014…so far (Q1)

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker...

Focus cyber risk on critical infrastructure: Remote substations are vulnerable

Doug DePeppe has some especially strong feelings about protecting remote substations from cyber attacks. Here is his guest CSO blog to explain why.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

New BitCrypt ransomware variant distributed by bitcoin stealing malware

Victims are asked to make bitcoin payments to recover encrypted files after their bitcoin wallets might have already been emptied

Hacker Diabl0 arrested in Thailand at the request of Swiss authorities

He is wanted in connection with computer fraud and credit card information theft in Switzerland


20 infamous hacker security vendor break-ins

Here are 20 of the most notorious known break-ins over the past decade.

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

Redefining Endpoint Security With Isolation Technology: An innovative, new security architecture

Find out how to secure your enterprise and empower your users to click on anything, anywhere without the fear of being compromised.

7 strategies for a successful DLP strategy

Investing in DLP technology can be costly and time consuming. Sapient's CISO Curtis Dalton offers tips on starting slow for an effective plan

Bitcoin-stealing malware hidden in Mt. Gox data dump, researcher says

Recently leaked Mt. Gox data archive contains a malicious application that steals Bitcoin wallet files, a researcher from Kaspersky Lab said

Big Data still 'a new frontier' for most of the public sector

NSA surveillance technology is cutting edge, but for most of the government, Big Data analytics is a promise unfulfilled

Top 5 skills needed for a SOC analyst

Whether building a new Security Operations Center or revamping an existing one, staffing it with analysts that are equipped with the proper skills sets should be priority number one, says Palo Alto's Rick Howard (registration required)

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

The cost of doing business at the RSA Conference

As attendance at the yearly conference rises, so do the costs of space on the expo floor, creating a debacle for smaller companies

I, journalist: public enemy number one

The journalists are the problem with global security? Well, if General Keith Alexander had his way they'd all be rounded up and dropped in a deep dark hole. Seems that his frustration has gotten the better of him.

Were stolen passports allowed on MH370?

Late Friday evening my wife shared with me the news that Malaysian Airlines flight MH370 had gone missing. I got quiet. This was the very same flight path route that I took from to Kuala Lumpur to Beijing a few months ago after...

Survey: IT pros not concerned about NSA spying

Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

Ukraine says Russia is attacking digital infrastructure

In a press statement on Tuesday, Valentyn Nalivaichenko, the head of Ukraine's SBU security service, told reporters that the mobile and Internet infrastructure is under attack by Russian forces.

The risk of offshoring security

Outsourcing across all industries has become commonplace, but as the InfoSec Institute's Kim Crawley points out, the economical and security issues of such a trend may cause irreparable damage


In Pictures: RSA Conference 2014

CSO traveled to San Francisco, CA last week in order to attend the RSA Conference, touted as the largest security event in North America. Here's a visual recap of the event from the show floor.

SANS seeks feedback in salary survey

SANS is asking for security professionals to weigh in on their latest salary survey

Load More