Physical Security

Physical Security | News, how-tos, features, reviews, and videos

6 industrial iot oil rig oil drilling cranes
deepfakes fake news tv head manipulation superimposed brainwashed

mobile purchase transaction

Magecart payment card skimmer gang returns stronger than ever

Web-based card skimmers are becoming harder to detect and remove thanks to evolving techniques.

2 industrial iot utility nuclear plant power plant

Congress steers clear of industrial control systems cybersecurity

Industry resistance to regulation, complexity of securing ICS systems are roadblocks to passage of critical infrastructure cybersecurity legislation.

pressure water line pipes pipeline deliver

City of Raleigh implements ICS monitoring tool for water treatment plants

Securing operational technology systems is a different game than IT, but the City of Raleigh has deployed a CSO50 award-winning network monitoring solution that gives them greater visibility into its PLCs.

industrial iot connected city

New CISA director outlines top 5 priorities for protecting U.S. critical infrastructure

CISA’s Christopher Krebs has a two-year plan for his new cybersecurity agency, with China, supply chain and 5G as top priorities.

capitol dome congress

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

3 industrial iot solar power panels energy network internet

Why America is not prepared for a Stuxnet-like cyber attack on the energy grid

The U.S. energy grid continues to be vulnerable to Aurora-like attacks that could cause blackouts lasting a year or more.

abstract arrows direction process magnifying glass search investigate

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in...

workspace organization rwh

The clean desk test

Ten ways a messy desk puts confidential information at risk.

phishing fishing lure bait binary hack security breach

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

computer forensics

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach.

forensics threat hunter cyber security thumbprint

Why you need a digital forensics team (and the skills to look for)

Prevention and detection aren't enough. To better defend against future intrusions, you need a strong digital forensics team that can analyze attacks.

hackathon contest computer competition hacking

Fear and loathing defending ICS security at DoE's CyberForce Competition

Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative.

Gate Smart Lock

What is physical security? How to keep your facilities and devices safe from on-site attackers

Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses.

8 encryption

Encryption is the best way to protect payment card transaction data

Criminals are going to steal payment card transaction data, but it won't matter if that data is devalued through encryption.

red number 7 on white wall top seven

More AI, consolidation and regionalization coming in 2019

It’s that time of year again, when we look back to look ahead. The 2019 security landscape holds new promise, threats, developments and opportunities to collectively tackle the issues our industry faces.

computer forensics

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make.

2 industrial iot utility nuclear plant power plant

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

Load More
You Might Also Like