Physical Security

Physical Security | News, how-tos, features, reviews, and videos

candle laptop blackout
binary neural network - artificial intelligence - machine learning

Passenger view of an airplane wing above the clouds. / travel / journey / transportation

Where Chicken Little meets information security

Outside of a movie theater, your plane won’t be hacked out of the sky.

Exclamation point on screen warning alert caution stop

Ways to improve your security team’s response time

Every second counts when it comes to incident response. With proper staffing, a streamlined procedure and the right tools in place, responding to threats can be a far less daunting task.

monitoring systems

Data is the oil of the 21st century

The cybersecurity lessons of the 2016 election and the changing nature of our critical infrastructure.

security threats and vulnerabilities

What price range sees the most CNP fraud? It depends

Data on the price ranges that online fraudsters target most are effective in helping retailers be more aware of fraud tendencies. However, any price point can be a target to some criminals, and it’s important to leverage this data to...

deepfakes fake news tv head manipulation superimposed brainwashed

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

fingerprint scan biometric security system

N-dimensional behavioral biometrics: a viable solution for digital fraud?

Artificial intelligence can be used to stop identity fraud from reaching record-breaking highs.

credit card fraud

Analyzing user behavior to stop fake accounts

Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.

number 4 four film strip

4 cybersecurity developments to watch in 2018

Be ready for when the future arrives, start monitoring a pipeline of emerging technologies.

Elon Musk

Insider threat becomes reality for Elon Musk

Every company needs to worry about the insider threat and Tesla is no exception. Now, Tesla has sued former employee Martin Tripp for sabotage and intellectual property theft.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

whyhpcmatters frauddetection 1000

3 things your marketing department can teach your CNP fraud prevention team

You may be surprised to learn that your marketing department can teach your fraud prevention team a lot about card not present fraud. Not only are the two departments working in tandem to reach the same goals, but the marketing...

Tattered US flag

Keeping the Stars and Stripes secure

Cybersecurity in the government sector has dominated the headlines the past couple years. Should we be concerned? What’s the reality, how did we get here, and what should government entities focus on moving forward?

cia

Josh Schulte: CIA insider gone south or repugnant criminal?

Josh Schulte, believed to have been the source of the leaked the "Vault 7" Wikileaks trove of CIA tools, has been charged with a heinous crime concerning illegal images.

soccer world cup

Cyber games at the World Cup 2018

Analysis of cyberthreats at the World Cup looking back at cyberattacks from the last tournament and predictions for this year.

army national guard combat training military

Information security in a war zone: How the Red Cross protects its data

The International Committee of the Red Cross faces unique and extreme security threats across the globe. Technology is not always the best defense.

facebook hallway london headquarters reuters toby melville rtx3l5uy

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...

social security card

Replacing the Social Security Number

Adopting a continuous "know your customer" (KYC) mentality.

Load More