Physical Security

Physical Security | News, how-tos, features, reviews, and videos

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable
election hacking security 2020 election security flag global breach by stuartmiles99 getty

binary code matrix broken / breached / failed / hacked / security risk / threat / vulnerability

Critical VxWorks flaws expose millions of devices to hacking

Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system (RTOS) that powers over 2 billion devices including enterprise network firewalls and routers, industrial controllers and...

credit card hack financial breach stealing money traffiking financial data target by igphotography

Stealing money in the digital age: The dark industry of trafficking financial data

Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks.

election hacking security 2020 election security flag global breach by stuartmiles99 getty

Why getting election security right for 2020 matters

The U.S. is moving at glacial speed to secure election systems against possible interference by foreign adversaries. We're not even close to ready, and that could call contests into question.

6 handling email phishing

Business email compromise: The odds of being a victim are increasing

Given the growth over the last few years in BEC and EAC fraud, businesses should educate employees about the risks involved and red flags of this activity.

Election secuity / ballot boxes / binary code

Secure elections scorecard: Grading the candidate and Congressional proposals

After 2016's election security debacle, there's a push to secure America's electronic voting infrastructure. Some of the proposals are good. Others fall short. CSO investigates.

succession brain sharing intellectual knowledge sharing

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

CSO  >  Adware  >  Browser windwows containing malicous code

What is adware? How it works and how to protect against it

Adware is deceptive software that earns its creators money through fraudulent user clicks. Fortunately, it's one of the the most detectable types of malware.

secure government messaging

What is the CISA? How the new federal agency protects critical infrastructure from cyber threats

The Cybersecurity and Infrastructure Security Agency (CISA) is a new federal agency, created to protect the nation's critical infrastructure.

questions to ask a vendor curious hand with question mark tablet ipad by stevanovicigor getty

6 questions to ask before buying an ICS / OT security monitoring tool

Shopping for an ICS / OT monitoring solution? Here's what you need to know about evaluating the vendors.

mike assante cyber security guru by ryan g poirier

Mike Assante’s lasting impact on critical infrastructure security (and me)

Thanks to Mike Assante, critical infrastructure stakeholders have a better understanding of and ability to respond to cybersecurity risks.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Why the Huawei ban is bad for security

Many believe the ban on exporting U.S. technology to Chinese company Huawei could hurt American tech vendors and do little to mitigate supply chain threats.

hacker linkedin scam romance scam on social media phishing heart

How to stick it to LinkedIn romance scammers

LinkedIn is becoming a popular channel for criminals to find victims for romance scams. Here's how to identify, report and block those scammers.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

security firewall breach hacker privacy battle id work getty

How to spot a scam: 14 red flags to watch for

Does your security awareness training program help your employees learn when someone is trying to scam them?

tip of the iceberg data breach hacked cyber security

Why reported breaches are the tip of the iceberg

Thousands of businesses are breached every day without them even knowing it, compromising payment card data. The EMV chip isn’t the solution, but data devaluation can reduce the impact.

green pin stuck in a gps device 125434813

What is GPS spoofing? And how you can defend against it

The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here's how it works and what you can do to mitigate its risk.

Hands write on paper with pen.

FINRA Rule 4512: U.S. SEC approves electronic signatures

The updated FINRA Rule 4512(a)(3) is now in effect, striking a blow against outdated regulations.

7 solar flare emergency doomsday

Why your business continuity and disaster recovery plans should account for EMP attacks and GMD events

A new executive order from the White House directs critical infrastructure to prepare for electromagnetic pulse (EMP) attacks, but geomagnetic disturbance (GMD) events caused by solar flares are a greater threat to the enterprise.

Load More
You Might Also Like