RFID

RFID | News, how-tos, features, reviews, and videos


information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

The CSO identity management survival guide

This guide will help you communicate through the challenges of identity management, learn from success stories and discover the most valuable features of today's identity management tools.

The 8 most significant ways physical security has evolved

From RFID badges to facial recognition, physical security has changed quite a bit over the years. We walk you through the most significant changes we've seen so far

8 ways physical security has evolved

Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Here are eight of...

Electronic pickpockets: fact or fantasy?

Wireless payment schemes aren't as insecure as some believe

Texas School RFID student tracking conflict headed for Federal court

Opinions about RFID have long been controversial, but no more so than when a Texas school tried to suspend a girl for refusing to wear a student ID card embedded with an RFID chip. By forcing students to hang the ID card around their...

Digital Signage: Privacy in a 'One-Way Mirror Society'

Digital signage is getting smarter, more interactive, and the ads with eyes come in many attention-snagging varieties. It's a big booming business to use digital signage to expand upon consumer interaction via RFID-enabled smart...

Creepy RFID Tracking Coming Soon to Human Embryos

Some radio-frequency identification (RFID) uses seem cool, while others seem downright creepy. We've previously seen that RFID can be used to track people from the cradle to the grave, but now there are plans to start tracking at...

Geoslavery: Location-Awareness Gone Wrong?

Long ago, way back in 2003, researchers Jerome Dobson and Peter Fisher published Geoslavery, a paper about a potential threat that might be created by location based information in the near future. Geoslavery is defined as "the...

The Next Big Privacy Concern: RFID “Spychips”

Radio-frequency I.D. (RFID) tags are a convenient way to track items and cut costs for companies. But this technology is increasingly being used to track other things, like security badges — or even people — giving it the potential...

6 Ways We Gave Up Our Privacy

Here's the story of how privacy went the way of the dinosaur, how we willingly let it happen and how we might be able to get some of it back.

New Travel Rules Amid Concerns over RFID-tagged Passport Cards

Card can be easily cloned, used for tracking purposes, critics say.

CBP and Smart Containers: What Does It Know?

Dr. Jim Giermanski, chairman of Powers Global Holdings, gives us a break down of both RFID and Satellite Communications, two container security device technologies.

E-passport Demo Shows Weaknesses in New Border Controls

RFID chips for e-passports can be cloned and modified without detection, representing a gaping security hole in next-generation border control systems.

Load More
You Might Also Like