Physical Security

Physical Security | News, how-tos, features, reviews, and videos

atm cash machine money

27 arrested for black box ATM attacks across Europe

Europol said in a statement last week that 27 people have been arrested for their connection to a string of successful black box attacks against ATMs across Europe. Since 2016, these attacks have resulted in more than €45 million in...

industrial refinery energy plant oil gas

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

trip packing luggage suitcase laptop

How to prevent your data from being searched at the US border

Travelers concerned about their privacy can take steps to protect their data as they cross the U.S. border. They should remember the old Boy Scout motto: Be prepared.

Hurricane Matthew

A guide to business continuity planning in the face of natural disasters

Natural disasters often strike with little to no warning, but their operational and economic impact to organizations can be devastating. Preparation is the best defense against these disasters, and the time for preparing is now –...

Met museum puts new technologies on display

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...

key metal home security encryption

Can Google’s Key Transparency make encrypted email ubiquitous?

The open nature of email makes implementing encryption complex. Google hopes to change that with its Key Transparency initiative.

1 picture that key

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 ways criminal hackers use high-tech surveillance—sometimes with a social engineering element—to tap into the enterprise to get the keys to your kingdom, or sensitive information.

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

workplace violence

Workplace violence: Prevention and response

Every year nearly 2 million Americans are victims of workplace violence, which is defined as any act or threat of physical violence, harassment, intimidation or other disruptive behavior that occurs at the work site. This article will...

cso50 intro

The evolving role of the chief security officer

Today's Chief Security Officers (CSO) are charged with mitigating an array of interdisciplinary and intersecting risks across the enterprise. The CSO role is evolving into a mission-critical service that spans risk areas ranging from...

01 network

How to lock down your security system

The most important, but least recognized, steps organizations must take to make their security systems more cyber secure.

active shooter drill

Why the CSO needs to be involved in active shooter prep

All security managers, especially those charged with physical security responsibilities, need to be involved in emergency prep for varying scenarios - including the potential for an active shooter on scene. Imad Mouline, CTO at...

electrical substation grid power lines

Grid security insights for 2017: Pressure mounts to prevent physical attacks

The new year will bring security challenges and its share of opportunities.

donald trump rally

Website taking donations for the assassination of Donald Trump and Mike Pence

A website launched earlier this week on the Darknet is calling for the assassination of President-elect Donald Trump and Vice President-elect Mike Pence, due to an extreme difference in opinion on their political views.

pacemaker hacking kit

Implantable medical devices can be hacked to harm patients

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K. have demonstrated.

iphone7 Apple store

Flash mobs the latest threat this holiday season

The holiday season rings in more than just higher sales for retailers. There's also more shoplifting and lower profit margins than the rest of the year, according to a report released today. Plus, this year, there's an extra surprise...

biokey

REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results.

airplane landing

Grey hats and blue skies, dealing with airline security

Since Sept. 11, 2001, the airline industry has been one of the fastest industries to upgrade their security procedures and protocols against various threats, both present and perceived. However, hackers don't need to board an airplane...

power plant railroad tracks

Security convergence in a utility environment

It used to be that physical, operational and IT security were managed in isolation. However, criminals, activists and competitors don’t think that way and will use any vulnerability to gain access to your sensitive systems or...

animus onetouch ping

New insulin pump flaws highlights security risks from medical devices

Medical device manufacturer Animas warns diabetic patients who use its OneTouch Ping insulin pumps about security issues that could allow hackers to take over the devices and deliver unauthorized doses of insulin.

Load More
You Might Also Like