Physical Security
Physical Security | News, how-tos, features, reviews, and videos
How Facebook protects data with physical security
Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...
Facial recognition tech used by UK cops is 'dangerously inaccurate'
Overall, the facial recognition technology used by UK cops has resulted in inaccurate matches 95 percent of the time.
IBM and thumb drives: epoxy or beacons?
Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.
NSA tripled phone record surveillance, collected 534M records in 2017
A transparency report from the Office of the Director of National Intelligence revealed a significant spike in the NSA’s surveillance of call and text records.
Secret global government surveillance: I'll spy for you, if you spy for me
New report from Privacy International highlights the ‘dangerous lack of oversight’ for secret global surveillance networks and intelligence sharing between governments.
Bridging the realms between cyber and physical security
Can there be better automated incident response for physical security?
Insecure by design: What you need to know about defending critical infrastructure
Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.
How to ensure that giving notice doesn’t mean losing data
The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.
7 ways to stay safe online on Valentine’s Day
Looking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet.
10 old-school security principles that (still) rule
Oldies but goodies, these security tips have stood the test of time.
The tangible threat of cyber-kinetic attacks
Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting...
Who are you really inviting in?
The hackable doorknob next door…
Are home security cameras ready for business use?
Thinking of buying a consumer IP camera for use as a surveillance system in your business? Read this first.
Information security – let's get physical
If we fail to leverage the combined power of both logical and physical security, we cannot possibly expect to fully secure any organization.
Senators try to reform law that allows U.S. agencies to surveil citizens
A group of U.S. senators introduced the USA Rights Act to limit surveillance of Americans' communications under Section 702 of the Foreign Intelligence Surveillance Act.
Beyond sandboxes: 'The Truman Show' approach to catching hackers
Deceptive technology has great potential as a counter intelligence tool that can completely turn the tables on the bad guys.
Social engineer bank robber arrested weeks after successful $142,000 heist
A Malaysian bank robber who used social engineering as his primary weapon in a string of thefts was recently arrested at his home in Batu Berendam, Malacca, three weeks after successfully walking away with $142,000 (RM600,000) by...
Skynet in China: Real-life 'Person of Interest' spying in real time
AI married to CCTV surveillance in China uses facial recognition and GPS tracking to overlay personal identifying information on people and cars in real time.
What is Stuxnet, who created it and how does it work?
Stuxnet is an extremely sophisticated computer worm that exploits multiple previously unknown Windows zero-day vulnerabilities to infect computers and spread. Its purpose was not just to infect PCs but to cause real-world physical...
10 emerging ICS and IIoT cybersecurity companies to watch
Keep an eye on these companies in the growing Industrial Control Systems (ICS) and Industrial Internet-of-Things (IIoT) security market.