Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

cisco industrial network director
emv chipandpin

swift security breaches

Swift hopes daily reporting will help stem payment fraud

Swift is introducing a new reporting system to help banks identify fraudulent payments made over its financial transfer network -- but the reports will arrive up to a day too late to stop them all.

candle laptop

Gmail outage for business users lasted over 12 hours

Gmail service for users of the Google for Work cloud-based productivity suite was down for over 12 hours on Wednesday, apparently affecting users in a number of countries including the U.S.

sept11

Memories of 9/11: More than lost buildings

Like many, my memories of 9/11 are personal and still vivid. Here's my story plus some little-known information about lost evidence on that day.

luc portelance theodoros sotiropoulos

Canada-EU counter-terror data exchange is illegal, says top EU judge

An agreement to send Canadian authorities passenger name record (PNR) data for flights from the European Union cannot be entered into in its current form, a top European Union judge has said.

apc battery backup

15% off APC 650VA 8-outlet Uninterruptible Power Supply and Surge Protector - Deal Alert

This backup power supply from APC provides guaranteed power for desktop computers, wireless networks, gaming consoles and other electronics, allowing you to work through power outages and protect your data and equipment.

dhs security

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”

wedding rings

How to make mergers and acquistions work

When tech companies "Merge and Purge" their IP, organizations on both sides of the trades can get nervous. Here's one recent deal that could actually mean a better set of solutions for everybody concerned.

04 insider threat

Combating insider threats faced by utilities

Today, grid operators face daily external threats from cyber hackers and criminals vandalizing or destroying company assets. While protections are in place to help prevent these external threats, utilities must realize that insiders...

attestation documents

A tale of two PCI attestation documents

Is your PCI service provider willing to easily share their AoC? That’s a good sign.

Identity and SDLC

Identity governance and admin: beyond basic access management

IGA solutions go beyond traditional identity management by allowing deep insight into access, providing data owners, auditors, and security teams with valuable information needed for timely management decisions and response.

bangkok traffic

Sophisticated malware possibly tied to recent ATM heists in Thailand

Security researchers have found a sophisticated malware program that may have been used recently by a gang of hackers to steal more than $350,000 from ATMs in Thailand.

voting sign

FBI: Common scanning tools used to target state election systems

An FBI memo citing information released by MS-ISAC says that foreign actors are using common scanning tools to locate vulnerable election systems. There is evidence to suggest, but not conclusively prove, that at least two incidents...

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

81p5l6fqewl. sl1500

25% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

voice of it

Voice technologies make waves in security

Advancements in voice technology could help law enforcement identify social engineers and other frauds and hoaxers

shopping mall crowd

PCI DSS – it takes a village

David Mundhenk and Ben Rothke show how the PCI Security Standards Council really wants PCI to succeed. Much to the chagrin of The National Retail Federation.

pokemon go app

Pokemon Go puts enterprises at risk

Eight statistics that might surprise you about Pokemon Go and the corporate network

Fake attacks by insiders to fool companies

Famous cybercrime groups and hacktivists “brands” may be a smokescreen to cover sophisticated insider attacks.

Load More