Physical Security

Physical Security | News, how-tos, features, reviews, and videos

security threats and vulnerabilities

What price range sees the most CNP fraud? It depends

Data on the price ranges that online fraudsters target most are effective in helping retailers be more aware of fraud tendencies. However, any price point can be a target to some criminals, and it’s important to leverage this data to...

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

fingerprint scan biometric security system

N-dimensional behavioral biometrics: a viable solution for digital fraud?

Artificial intelligence can be used to stop identity fraud from reaching record-breaking highs.

credit card fraud

Analyzing user behavior to stop fake accounts

Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.

number 4 four film strip

4 cybersecurity developments to watch in 2018

Be ready for when the future arrives, start monitoring a pipeline of emerging technologies.

Elon Musk

Insider threat becomes reality for Elon Musk

Every company needs to worry about the insider threat and Tesla is no exception. Now, Tesla has sued former employee Martin Tripp for sabotage and intellectual property theft.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

whyhpcmatters frauddetection 1000

3 things your marketing department can teach your CNP fraud prevention team

You may be surprised to learn that your marketing department can teach your fraud prevention team a lot about card not present fraud. Not only are the two departments working in tandem to reach the same goals, but the marketing...

Tattered US flag

Keeping the Stars and Stripes secure

Cybersecurity in the government sector has dominated the headlines the past couple years. Should we be concerned? What’s the reality, how did we get here, and what should government entities focus on moving forward?

cia

Josh Schulte: CIA insider gone south or repugnant criminal?

Josh Schulte, believed to have been the source of the leaked the "Vault 7" Wikileaks trove of CIA tools, has been charged with a heinous crime concerning illegal images.

soccer world cup

Cyber games at the World Cup 2018

Analysis of cyberthreats at the World Cup looking back at cyberattacks from the last tournament and predictions for this year.

army national guard combat training military

Information security in a war zone: How the Red Cross protects its data

The International Committee of the Red Cross faces unique and extreme security threats across the globe. Technology is not always the best defense.

facebook hallway london headquarters reuters toby melville rtx3l5uy

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...

social security card

Replacing the Social Security Number

Adopting a continuous "know your customer" (KYC) mentality.

01 day breach calendar year

One year later: security debt makes me WannaCry

WannaCry rocked the world one year ago, but there are still lessons for us to unpack about the debt we still have to pay to be secure.

Phishing trends

Scamming the scammers

There is no absolute way to completely eradicate end users’ susceptibility to scams, but with constant care and diligence (coupled with technical measures), it’s possible to provide guidance to ensure a heightened awareness and...

cybersecurity

White House axes cyber czar role; DHS unveils new cybersecurity strategy

The White House eliminated the top cybersecurity coordinator position even as Homeland Security warned that "our cyber adversaries can now threaten the very fabric of our republic itself."

orange monitors with lock icon network security cyber threat

Fighting fraud: Tips for getting ahead of the ever-evolving threat

Fraud is largely inevitable but fighting it doesn’t have to be fruitless. Chris Camacho shares tips to help businesses combat this threat more effectively.

Apple phishing webpage

Salted Hash - SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take...

thumbs down crush squish hand with thumb

IBM and thumb drives: epoxy or beacons?

Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.

Load More