RFID
RFID | News, how-tos, features, reviews, and videos
Tech Primer
Fraud prevention: Improving internal controls
Tech Primer
How to write an information security policy
Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.
Tech Primer
Red team versus blue team: How to run an effective simulation
Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.
Tech Primer
How to survive (and thrive) in the CISO hot seat
The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.
eBook
Special report: platforms play big in the cloud
This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.
Research/Infographic
Research report: IT security's looming tipping point
Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.
eGuide
The CSO identity management survival guide
This guide will help you communicate through the challenges of identity management, learn from success stories and discover the most valuable features of today's identity management tools.
The 8 most significant ways physical security has evolved
From RFID badges to facial recognition, physical security has changed quite a bit over the years. We walk you through the most significant changes we've seen so far
8 ways physical security has evolved
Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Here are eight of...
Electronic pickpockets: fact or fantasy?
Wireless payment schemes aren't as insecure as some believe
Texas School RFID student tracking conflict headed for Federal court
Opinions about RFID have long been controversial, but no more so than when a Texas school tried to suspend a girl for refusing to wear a student ID card embedded with an RFID chip. By forcing students to hang the ID card around their...
Digital Signage: Privacy in a 'One-Way Mirror Society'
Digital signage is getting smarter, more interactive, and the ads with eyes come in many attention-snagging varieties. It's a big booming business to use digital signage to expand upon consumer interaction via RFID-enabled smart...
Creepy RFID Tracking Coming Soon to Human Embryos
Some radio-frequency identification (RFID) uses seem cool, while others seem downright creepy. We've previously seen that RFID can be used to track people from the cradle to the grave, but now there are plans to start tracking at...
Geoslavery: Location-Awareness Gone Wrong?
Long ago, way back in 2003, researchers Jerome Dobson and Peter Fisher published Geoslavery, a paper about a potential threat that might be created by location based information in the near future. Geoslavery is defined as "the...
The Next Big Privacy Concern: RFID “Spychips”
Radio-frequency I.D. (RFID) tags are a convenient way to track items and cut costs for companies. But this technology is increasingly being used to track other things, like security badges — or even people — giving it the potential...
6 Ways We Gave Up Our Privacy
Here's the story of how privacy went the way of the dinosaur, how we willingly let it happen and how we might be able to get some of it back.
New Travel Rules Amid Concerns over RFID-tagged Passport Cards
Card can be easily cloned, used for tracking purposes, critics say.
CBP and Smart Containers: What Does It Know?
Dr. Jim Giermanski, chairman of Powers Global Holdings, gives us a break down of both RFID and Satellite Communications, two container security device technologies.
E-passport Demo Shows Weaknesses in New Border Controls
RFID chips for e-passports can be cloned and modified without detection, representing a gaping security hole in next-generation border control systems.