Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

Why the recent court ruling on Gmail matters to you

Email may be coming under different guidance when it comes to warrants and subpoenas as society and the courts address the evolution of technology. Are you prepared to engage in the discussion?

internet gavel keyboard

security awareness

No money, no problem: Building a security awareness program on a shoestring budget

Implementing a security awareness program seems rather straightforward, until you actually start to implement one - factoring in things like resources and the people (users) to be trained. At that point, it can seem complicated,...

street map map directions travel planning 000000559894

Beef up your security and avoid being a victim on vacation this summer

People falling prey to cyberattacks and breaches of physical security while traveling is not uncommon. Here's how to take steps to ensure that you and your assets stay safe

Watermark Retirement Communities suffers laptop theft

Late on Thursday afternoon people all around California were getting ready for July 4th celebrations the next day. What a better time to release notice of a stolen laptop then at that point. Maybe, just maybe, no one would notice.

Turning your security strategy inside out: The convergence of insider and advanced threat

Jason Clark and James Robinson of Accuvant discuss how security leaders can think outside the box when developing or revisiting their insider threat strategies.

internet gavel keyboard

Microsoft's takedown of No-IP pushes innocents into the crossfire

On Monday, Microsoft said they were taking No-IP ( to task for failing to prevent criminals from abusing their services. The case is Microsoft's latest effort to slow the spread of malware online, but this time innocents are...

Riverside County Regional Medical Center suffers data breach

I have to admit that stories about data breaches are becoming as common as days that end in “y”.


A View of the World from Your Office

As you gaze out the window of your office, ever wonder if someone is looking back?

security checkpoint

Culture clash: How physical security is impacted by cultural norms

Culture, of all things, can affect the strength of physical perimeter security, for better or for worse. We offer a look at what is and isn't working overseas, and why


Hotel Security: Navigating concerns and identifying solutions

Business and recreational travelers demand safe and secure hotel accommodations, as well as responsive and friendly customer service. How can hoteliers ensure both expectations are met?

stack of credit cards in isolated white 000001679406

American Express customers receiving new breach notifications

Customers of American Express are starting to get a new round of breach notification letters. This time, the letters are due to two separate breaches, but the full impact isn't clear.

As iPhone thefts drop, Google and Microsoft plan kill switches on smartphones

After a year of pressure, U.S. law enforcement officials announce a major success in their phone anti-theft push

5 Innovations That Make Video Surveillance More Effective

Criminals get a little more sophisticated every day. Fortunately, so does video surveillance technology. Here are five options to consider for your business, no matter the size.

Fraud definition

When chatbots could become a real security threat

Whether a computer-powered chatbot recently passed the Turing Test for artificial intelligence is debatable, but there's little doubt that the growing sophistication of the conversation programs could one day make them a threat to...


8 security hits and misses on the silver screen

Security has played a bigger role in cinema than you may think

How to use a cyber war exercise to improve your security program

3 lessons learned by the participants of a recent cyber war strategic exercise that offer insights into a pathway for improvement for everyone

University researchers test cyber-defense for nation's power grid

University researchers are testing whether a distributed computing system could be used to prevent a major blackout during a cyberattack on the nation's power grid.

In Depth

Information overload: Finding signals in the noise

Signal-to-noise ratios are hard to manage. As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and...

Fraud definition

Sleeping companies lose big from employee, executive fraud

Companies that fail to continually watch for employee and executive fraud typically lose 5 percent of revenues each year to insider cunning, which amounts to nearly $3.7 trillion globally, a report found

Load More