Physical Security

Physical Security | News, how-tos, features, reviews, and videos

2 industrial iot utility nuclear plant power plant
pressure water line pipes pipeline deliver

industrial iot connected city

New CISA director outlines top 5 priorities for protecting U.S. critical infrastructure

CISA’s Christopher Krebs has a two-year plan for his new cybersecurity agency, with China, supply chain and 5G as top priorities.

capitol dome congress

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

3 industrial iot solar power panels energy network internet

Why America is not prepared for a Stuxnet-like cyber attack on the energy grid

The U.S. energy grid continues to be vulnerable to Aurora-like attacks that could cause blackouts lasting a year or more.

abstract arrows direction process magnifying glass search investigate

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in...

workspace organization rwh

The clean desk test

Ten ways a messy desk puts confidential information at risk.

phishing fishing lure bait binary hack security breach

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

computer forensics

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach.

forensics threat hunter cyber security thumbprint

Why you need a digital forensics team (and the skills to look for)

Prevention and detection aren't enough. To better defend against future intrusions, you need a strong digital forensics team that can analyze attacks.

hackathon contest computer competition hacking

Fear and loathing defending ICS security at DoE's CyberForce Competition

Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative.

Gate Smart Lock

What is physical security? How to keep your facilities and devices safe from on-site attackers

Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses.

8 encryption

Encryption is the best way to protect payment card transaction data

Criminals are going to steal payment card transaction data, but it won't matter if that data is devalued through encryption.

red number 7 on white wall top seven

More AI, consolidation and regionalization coming in 2019

It’s that time of year again, when we look back to look ahead. The 2019 security landscape holds new promise, threats, developments and opportunities to collectively tackle the issues our industry faces.

computer forensics

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make.

2 industrial iot utility nuclear plant power plant

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

deepfakes fake news tv head manipulation superimposed brainwashed

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

spinning globe smart city iot skyscrapers city scape internet digital transformation

Remember: It’s not all about the 1s and 0s

Don't forget the role of physical security in protecting your assets...even the digital ones.

intro cyber attack maps

Defense, security and the real enemies

The end of the Cold War meant that the countries that threatened American democracy and our way of life didn’t go away. They adapted to use technology to attack us instead. Now that the extent of these attacks is being made known, we...

Load More