opinionThe classified document leak: let's talk about Jack Teixeira's need-to-knowThe release of classified documents by a US Air National Guardsman highlights how important it is for CISOs to consider who should have access to sensitive data and why.By Christopher BurgessApr 18, 20237 minsMilitaryMilitaryMilitary news analysis Surge of swatting attacks targets corporate executives and board membersBy Cynthia BrumfieldFeb 08, 20236 minsData and Information SecurityPhysical Securityanalysis Stuxnet explained: The first known cyberweaponBy Josh FruhlingerAug 31, 202211 minsMalwareCybercrimePhysical Security featureCybersecurity researchers face real-life threatsBy Andrada Fiscutean Jun 21, 202212 minsPhysical SecurityRisk Management opinionApple AirTag and other tagging devices add to CISO worriesBy Christopher Burgess Feb 03, 20225 minsCybercrimePhysical Security news analysisAustralia's physical-security specialists looking to take on information securityBy David Braue Sep 29, 20216 minsCSO and CISOData and Information SecurityPhysical Security featureThe CSO role today: Responsibilities and requirements for the top security jobBy Josh Fruhlinger May 20, 202113 minsCSO and CISOData and Information SecurityPhysical Security featureHow drones affect your threat modelBy Jaikumar Vijayan Aug 03, 202010 minsPhysical SecurityRisk ManagementSecurity featureThe clean desk testBy Joan Goodchild Jan 22, 20195 minsPhysical SecuritySecurity ArticlesopinionIBM and thumb drives: epoxy or beacons?Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.By Salvatore Stolfo May 14, 2018 4 minsData and Information SecurityNetwork SecurityPhysical SecurityopinionBridging the realms between cyber and physical securityCan there be better automated incident response for physical security? By Rick Grinnell Apr 11, 2018 4 minsTechnology IndustryData and Information SecurityPhysical Securitynews analysisInsecure by design: What you need to know about defending critical infrastructurePatching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.By J.M. Porup Mar 07, 2018 14 minsAdvanced Persistent ThreatsAdvanced Persistent ThreatsAdvanced Persistent ThreatsopinionHow to ensure that giving notice doesn't mean losing dataThe employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive. By Isaac Kohen Feb 13, 2018 4 minsTechnology IndustryAccess ControlData and Information Securityopinion7 ways to stay safe online on Valentine's DayLooking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet. By Justin Dolly Feb 12, 2018 6 minsTechnology IndustryData and Information SecurityPhysical Securityfeature10 old-school security principles that (still) ruleOldies but goodies, these security tips have stood the test of time.By Josh Fruhlinger Jan 30, 2018 9 minsPhishingNetwork SecurityPhysical SecurityopinionThe tangible threat of cyber-kinetic attacksConnecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the physical world in which we live and – potentially – our own physical well-being.By Marin Ivezic Jan 02, 2018 6 minsTechnology IndustryCyberattacksInternet of ThingsopinionWho are you really inviting in?The hackable doorknob next door…By Eva Velasquez Dec 13, 2017 4 minsIdentity Management SolutionsInternet of ThingsPhysical SecurityanalysisAre home security cameras ready for business use?Thinking of buying a consumer IP camera for use as a surveillance system in your business? Read this first.By Roger Grimes Nov 30, 2017 9 minsPhysical SecurityConsumer ElectronicsSecurityopinionInformation security - let’s get physicalIf we fail to leverage the combined power of both logical and physical security, we cannot possibly expect to fully secure any organization.By Robert Covington Nov 13, 2017 5 minsTechnology IndustryData and Information SecurityPhysical SecurityopinionBeyond sandboxes: ‘The Truman Show’ approach to catching hackersDeceptive technology has great potential as a counter intelligence tool that can completely turn the tables on the bad guys.By Stephen Coty Oct 23, 2017 4 minsTechnology IndustryHackingData and Information SecuritynewsSocial engineer bank robber arrested weeks after successful $142,000 heistAll the Malaysian bank robber needed was a slip of paper and a decent storyBy Steve Ragan Oct 09, 2017 4 minsSocial EngineeringPhysical SecuritySecurity Show more Show less View all Resources whitepaper 2023 Global Employee Experience Trends Report Our report spans 25 countries in five regions, and we interviewed 1,442 customer experience (CX) and EX decision-makers and influencers across a range of business roles, from IT, IT security and digital operations to the C-suite. The post 2023 Global Employee Experience Trends Report appeared first on Whitepaper Repository. By NTT DATA & Microsoft 06 Dec 2023Business OperationsBusiness Process ManagementRemote Work whitepaper Enhancing the employee experience with NTT DATA By NTT DATA & Microsoft 06 Dec 2023Business OperationsBusiness Process ManagementRemote Work whitepaper How has Operator Connect by NTT DATA become such a great success? By NTT DATA & Microsoft 06 Dec 2023Business OperationsBusiness Process ManagementMicrosoft Teams View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis Attackers breach US government agencies through ColdFusion flaw By Lucian Constantin Dec 06, 20235 mins Advanced Persistent ThreatsAdvanced Persistent ThreatsAdvanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology By John P. Mello Jr. Dec 06, 20234 mins Application SecurityNetwork Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey By Gagandeep Kaur Dec 06, 20234 mins IT JobsSecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO