Physical Security

Physical Security | News, how-tos, features, reviews, and videos

number 4 four film strip
Elon Musk

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

whyhpcmatters frauddetection 1000

3 things your marketing department can teach your CNP fraud prevention team

You may be surprised to learn that your marketing department can teach your fraud prevention team a lot about card not present fraud. Not only are the two departments working in tandem to reach the same goals, but the marketing...

Tattered US flag

Keeping the Stars and Stripes secure

Cybersecurity in the government sector has dominated the headlines the past couple years. Should we be concerned? What’s the reality, how did we get here, and what should government entities focus on moving forward?

cia

Josh Schulte: CIA insider gone south or repugnant criminal?

Josh Schulte, believed to have been the source of the leaked the "Vault 7" Wikileaks trove of CIA tools, has been charged with a heinous crime concerning illegal images.

soccer world cup

Cyber games at the World Cup 2018

Analysis of cyberthreats at the World Cup looking back at cyberattacks from the last tournament and predictions for this year.

army national guard combat training military

Information security in a war zone: How the Red Cross protects its data

The International Committee of the Red Cross faces unique and extreme security threats across the globe. Technology is not always the best defense.

facebook hallway london headquarters reuters toby melville rtx3l5uy

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...

social security card

Replacing the Social Security Number

Adopting a continuous "know your customer" (KYC) mentality.

01 day breach calendar year

One year later: security debt makes me WannaCry

WannaCry rocked the world one year ago, but there are still lessons for us to unpack about the debt we still have to pay to be secure.

Phishing trends

Scamming the scammers

There is no absolute way to completely eradicate end users’ susceptibility to scams, but with constant care and diligence (coupled with technical measures), it’s possible to provide guidance to ensure a heightened awareness and...

cybersecurity

White House axes cyber czar role; DHS unveils new cybersecurity strategy

The White House eliminated the top cybersecurity coordinator position even as Homeland Security warned that "our cyber adversaries can now threaten the very fabric of our republic itself."

orange monitors with lock icon network security cyber threat

Fighting fraud: Tips for getting ahead of the ever-evolving threat

Fraud is largely inevitable but fighting it doesn’t have to be fruitless. Chris Camacho shares tips to help businesses combat this threat more effectively.

Apple phishing webpage

Salted Hash - SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take...

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

thumbs down crush squish hand with thumb

IBM and thumb drives: epoxy or beacons?

Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.

sepia number 3 film reel top three

The 3 hidden costs of incident response

Every business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.

whyhpcmatters frauddetection 1000

CNP fraud spikes during the holiday shopping season. Here are 3 things you can do now to protect your holiday sales

CNP fraud spikes during every holiday season, and 2018 will be no exception. Before it’s too late, online retailers need to get prepared in their fraud prevention efforts. Here are three steps that online sellers can take right now to...

woman on smartphone city network security leader iot

What is a Chief Security Officer (CSO)? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Load More