opinionThe classified document leak: let's talk about Jack Teixeira's need-to-knowThe release of classified documents by a US Air National Guardsman highlights how important it is for CISOs to consider who should have access to sensitive data and why.By Christopher Burgess18 Apr 20237 minsMilitaryGovernmentData and Information Security news analysis Surge of swatting attacks targets corporate executives and board membersBy Cynthia Brumfield08 Feb 20236 minsData and Information SecurityPhysical Securityanalysis Stuxnet explained: The first known cyberweaponBy Josh Fruhlinger31 Aug 202211 minsMalwareMalwareMalware featureCybersecurity researchers face real-life threatsBy Andrada Fiscutean 21 Jun 202212 minsPhysical SecurityRisk Management opinionApple AirTag and other tagging devices add to CISO worriesBy Christopher Burgess 03 Feb 20225 minsCybercrimePhysical Security featureAs adversaries watch and wait, Western Sydney Airport is a greenfield cybersecurity opportunityBy David Braue 16 Jan 20225 minsPhysical SecuritySecurity InfrastructureSecurity news analysisAustralia's physical-security specialists looking to take on information securityBy David Braue 29 Sep 20216 minsCSO and CISOData and Information SecurityPhysical Security featureThe CSO role today: Responsibilities and requirements for the top security jobBy Josh Fruhlinger 20 May 202113 minsCSO and CISOData and Information SecurityPhysical Security featureHow drones affect your threat modelBy Jaikumar Vijayan 03 Aug 202010 minsPhysical SecurityRisk ManagementSecurity ArticlesfeatureHow Facebook protects data with physical securityFacebook takes an integrated approach to keeping data safe. Even the company’s office buildings are designed to put physical protection between servers and the public.By Terena Bell 30 May 2018 5 minsPhysical SecuritySecurityopinionIBM and thumb drives: epoxy or beacons?Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.By Salvatore Stolfo 14 May 2018 4 minsData and Information SecurityNetwork SecurityPhysical SecurityopinionBridging the realms between cyber and physical securityCan there be better automated incident response for physical security? By Rick Grinnell 11 Apr 2018 4 minsTechnology IndustryData and Information SecurityPhysical Securitynews analysisInsecure by design: What you need to know about defending critical infrastructurePatching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.By J.M. Porup 07 Mar 2018 14 minsAdvanced Persistent ThreatsCritical InfrastructureNetwork SecurityopinionHow to ensure that giving notice doesn't mean losing dataThe employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive. By Isaac Kohen 13 Feb 2018 4 minsTechnology IndustryAccess ControlData and Information Securityopinion7 ways to stay safe online on Valentine's DayLooking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet. By Justin Dolly 12 Feb 2018 6 minsTechnology IndustryData and Information SecurityPhysical Securityfeature10 old-school security principles that (still) ruleOldies but goodies, these security tips have stood the test of time.By Josh Fruhlinger 30 Jan 2018 9 minsPhishingNetwork SecurityPhysical SecurityopinionThe tangible threat of cyber-kinetic attacksConnecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the physical world in which we live and – potentially – our own physical well-being.By Marin Ivezic 02 Jan 2018 6 minsTechnology IndustryCyberattacksInternet of ThingsopinionWho are you really inviting in?The hackable doorknob next door…By Eva Velasquez 13 Dec 2017 4 minsIdentity Management SolutionsInternet of ThingsPhysical SecurityanalysisAre home security cameras ready for business use?Thinking of buying a consumer IP camera for use as a surveillance system in your business? Read this first.By Roger Grimes 30 Nov 2017 9 minsPhysical SecurityConsumer ElectronicsSecurityopinionInformation security - let’s get physicalIf we fail to leverage the combined power of both logical and physical security, we cannot possibly expect to fully secure any organization.By Robert Covington 13 Nov 2017 5 minsTechnology IndustryData and Information SecurityPhysical SecurityopinionBeyond sandboxes: ‘The Truman Show’ approach to catching hackersDeceptive technology has great potential as a counter intelligence tool that can completely turn the tables on the bad guys.By Stephen Coty 23 Oct 2017 4 minsTechnology IndustryHackingData and Information Security Show more Show less View all Resources whitepaper Test & Learn - The ultimate guide to delivering high quality, high impact products This year, the Progressive Delivery and Experimentation Summit, brought together nearly 1500 professionals. Leaders from Product, Engineering, and Data presented frameworks for adapting software development and delivery practices The post Test & Learn – The ultimate guide to delivering high quality, high impact products appeared first on Whitepaper Repository. By Optimizely 18 Sep 2023Business OperationsFinance and Accounting SystemsMarketing Software whitepaper Modernize and Scale on AWS By Koan 22 Aug 2023Amazon Web ServicesCloud ManagementIT Management whitepaper The Total Economic Impact(TM) Of Optimizely Digital Experience Platform By Optimizely 06 Aug 2023Business OperationsFinance and Accounting SystemsMarketing Software View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK CSO 30 Awards 2023 winners announced By Romy Tuin 05 Dec 20234 mins CSO and CISOC-SuiteRoles news analysis Deepfakes emerge as a top security threat ahead of the 2024 US election By Cynthia Brumfield 05 Dec 20237 mins Election HackingGovernmentSecurity Practices feature How cybersecurity teams should prepare for geopolitical crisis spillover By Christopher Whyte 05 Dec 202312 mins Advanced Persistent ThreatsThreat and Vulnerability ManagementRisk Management podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO