Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

alert hacking threat detected
atm cash machine money

iran map

Iran espionage capabilities have a powerful bite

Look at the threat posed by IRAN to the United States and elsewhere

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

industrial refinery energy plant oil gas

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

baby infant mom

What not to get Mom for Mother’s Day

With Mother’s Day just a few days away, this is the day that you thank your Mom for her love and support. … But don’t thank her with a gift card.

emmanuel macron france

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope.

old billboard

Ad network takes steps to reduce fraud

Online advertisers are losing billions to fraud, but one advertising network has successfully taken steps to clean up its platform. U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8...

1 tracking hunting dogs horse

The Knights Fork: Hunting the hunter

The true ROI of cybersecurity investment is the delta in dwell time. There is direct correlation between cybersecurity investment and brand protection. Hunting gives an organization the opportunity to turn the tables on an adversary....

trip packing luggage suitcase laptop

How to prevent your data from being searched at the US border

Travelers concerned about their privacy can take steps to protect their data as they cross the U.S. border. They should remember the old Boy Scout motto: Be prepared.

Hurricane Matthew

A guide to business continuity planning in the face of natural disasters

Natural disasters often strike with little to no warning, but their operational and economic impact to organizations can be devastating. Preparation is the best defense against these disasters, and the time for preparing is now –...

gift cards

Criminals turning to fraudulent gift cards

As retailers and other businesses increase security measures to prevent the use of gift cards purchased with stolen credit card numbers, cyber criminals have been focusing on fraudulent gift cards, according to a report released this...

beware

Job seekers beware of recruiters

Paying a recruiter to find you a job could leave you the victim of a scam. Trending scams that could leave N00bs paying to stay unemployed.

abandoned wallet

Human weakness enabling financial cybercrime

Cybercrime costs $3 trillion worldwide. One reason, a Boston police detective told a Boston banking audience, is because they make it too easy.

us security

Dan Geer: Cybersecurity is 'paramount national security risk'

Cybersecurity and the future of humanity “are conjoined now,” according to In-Q-Tel’s Dan Geer. The cybersecurity futurist, in the closing keynote at SOURCE Boston 2017, gave a sobering look at what is likely to come in a world where...

train rerailment bridge collapse

Cyber infrastructure: Too big to fail, and failing

Just about everybody – from enterprises to individuals – depend on cyber protection. They aren’t getting that much, according to the Atlantic Council’s Joshua Corman.

commence shopping cart

Buying fraud right off the virtual rack

Report finds fraud running rampant, especially in the retail sector.

Met museum puts new technologies on display

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

water bubbler fountain drinking

Protecting vital water infrastructure

Safe drinking water is a necessity for protecting public health and safety. Water systems in the United States perpetuate all human activity and properly treated wastewater is vital for preventing disease and protecting the...

Load More