Showing posts with label CSO Online Physical Security. Show all posts
Showing posts with label CSO Online Physical Security. Show all posts

Monday, 31 August 2020

Monday, 3 August 2020

How drones affect your threat model

Most security leaders are unlikely to have drones on the list of threats they need to defend against on the cyber or physical security front. Drones can, however, introduce new risks that organizations need to recognize and address proactively, say security experts, even if an organization isn’t using them.

To read this article in full, please click here

(Insider Story)

from CSO Online Physical Security https://ift.tt/33iMyj6
via https://ifttt.com/ IFTTT

Wednesday, 5 September 2018

Hacking smart buildings

You're settling into your cubicle with a hot cup of coffee when the haunting begins. The HVAC blows cold on your neck. That's weird, you think. You take a sip of your coffee but choke when the moaning starts. The pipes never sound like that. The lights flicker, go out. A hush, then panic sets in across the office.

To read this article in full, please click here

(Insider Story)

from CSO Online Physical Security https://ift.tt/2NdYwTB
via https://ifttt.com/ IFTTT

Friday, 8 June 2018

Information security in a war zone: How the Red Cross protects its data

How do you secure sensitive information in a war zone if you're the International Committee of the Red Cross (ICRC)? Founded in 1863, the Red Cross faces serious information security threats as it continues its mission to provide humanitarian aid in conflict zones, to visit detainees in prison, and to help re-unite refugee families driven from their homes.

To read this article in full, please click here

(Insider Story)

from CSO Online Physical Security https://ift.tt/2JFsNZu
via https://ifttt.com/ IFTTT

Tuesday, 30 January 2018

10 old-school security priniciples that (still) rule

If you're always scrambling to keep your IT infrastructure updated, you might think that newer is always better when it comes to security: new patches, new and more secure hardware, new crypto techniques, etc.  But when it comes to fundamentals, some things are eternal. For instance, according to Jeff Williams, CTO and co-founder of Contrast Security, "The design principles from Saltzer and Schroeder's  1975 article 'The Protection of Information in Computer Systems' are still incredibly useful and often ignored."

To read this article in full, please click here

(Insider Story)

from CSO Online Physical Security http://ift.tt/2DNfoIG
via https://ifttt.com/ IFTTT