opinionThe classified document leak: let’s talk about Jack Teixeira’s need-to-knowThe release of classified documents by a US Air National Guardsman highlights how important it is for CISOs to consider who should have access to sensitive data and why.By Christopher BurgessApr 18, 20237 minsMilitaryGovernmentData and Information Security news analysis Surge of swatting attacks targets corporate executives and board membersBy Cynthia BrumfieldFeb 08, 20236 minsData and Information SecurityPhysical Securityanalysis Stuxnet explained: The first known cyberweaponBy Josh FruhlingerAug 31, 202211 minsMalwareCybercrimePhysical Security featureCybersecurity researchers face real-life threatsBy Andrada Fiscutean Jun 21, 202212 minsPhysical SecurityRisk Management opinionApple AirTag and other tagging devices add to CISO worriesBy Christopher Burgess Feb 03, 20225 minsCybercrimePhysical Security news analysisAustralia’s physical-security specialists looking to take on information securityBy David Braue Sep 29, 20216 minsCSO and CISOData and Information SecurityPhysical Security featureThe CSO role today: Responsibilities and requirements for the top security jobBy Josh Fruhlinger May 20, 202113 minsCSO and CISOData and Information SecurityPhysical Security featureHow drones affect your threat modelBy Jaikumar Vijayan Aug 03, 202010 minsPhysical SecurityRisk ManagementSecurity ArticlesfeatureThe clean desk testTen ways a messy desk puts confidential information at risk.By Joan Goodchild Jan 22, 2019 5 minsPhysical SecuritySecurityopinionMore AI, consolidation and regionalization coming in 2019It’s that time of year again, when we look back to look ahead. The 2019 security landscape holds new promise, threats, developments and opportunities to collectively tackle the issues our industry faces.By Rick Grinnell Nov 26, 2018 5 minsTechnology IndustryData and Information SecurityPhysical SecurityfeatureThe state of ICS and IIoT security in 2019Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it. By Dan Swinhoe Nov 12, 2018 5 minsInternet of ThingsPhysical SecuritySecurityopinionRemember: It’s not all about the 1s and 0sDon't forget the role of physical security in protecting your assets…even the digital onesBy Bob Bragdon Nov 07, 2018 4 minsPhysical SecuritySecuritynews analysisHacking smart buildingsForget about internet-connected toasters. Your "intelligent" office building is one giant, vulnerable IoT device.By J.M. Porup Sep 05, 2018 7 minsInternet of ThingsPhysical SecuritySecurity InfrastructureopinionOur electric grid is vulnerable to cyberattacks. Here’s what we need to doAs more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major catastrophe.By Rick Grinnell Aug 27, 2018 6 minsCyberattacksCritical InfrastructurePhysical SecurityopinionWhere Chicken Little meets information securityOutside of a movie theater, your plane won’t be hacked out of the sky.By Ben Rothke Aug 14, 2018 12 minsCyberattacksHackingTechnology IndustryopinionKeeping the Stars and Stripes secureSome of the most pressing threats to our national security are found not in the physical world, but in cyberspace. It's past time for our nation to adapt to the changing landscape and bring our security infrastructure up to speed.By Chris Wysopal Jun 15, 2018 5 minsGovernment ITGovernmentTechnology IndustryopinionCyber games at the World Cup 2018Analysis of cyberthreats at the World Cup looking back at cyberattacks from the last tournament and predictions for this year.By Martin McKeay Jun 11, 2018 6 minsTechnology IndustryCyberattacksPhysical Securitynews analysisInformation security in a war zone: How the Red Cross protects its dataThe International Committee of the Red Cross faces unique and extreme security threats across the globe. Technology is not always the best defense.By J.M. Porup Jun 08, 2018 7 minsPhysical SecuritySecurityfeatureHow Facebook protects data with physical securityFacebook takes an integrated approach to keeping data safe. Even the company’s office buildings are designed to put physical protection between servers and the public.By Terena Bell May 30, 2018 5 minsPhysical SecuritySecurityopinionIBM and thumb drives: epoxy or beacons?Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.By Salvatore Stolfo May 14, 2018 4 minsData and Information SecurityNetwork SecurityPhysical Security Show more Show less View all Resources whitepaper Keeping Financial Services Organizations Secure in an AI World When we talk about financial services and technology, security and regulatory compliance are always top of mind. And now, GenAI Has entered the chat, so to speak. The post Keeping Financial Services Organizations Secure in an AI World appeared first on Whitepaper Repository –. By Splunk 26 Jul 2024Artificial IntelligenceBusiness OperationsFinancial Services Industry whitepaper The Pharma Technology Playbook By Salesforce 25 Jul 2024Business OperationsEmerging TechnologyHealthcare Industry whitepaper Grounded in Data: One Connected Platform for Improved Patient Engagement By Salesforce 25 Jul 2024Big DataBusiness OperationsHealthcare Industry View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis Secure Boot no more? Leaked key, faulty practices put 900 PC/server models in jeopardy By Lucian Constantin Jul 26, 20247 mins Vulnerabilities news Counting the cost of CrowdStrike: the bug that bit billions By Shweta Sharma Jul 26, 20241 min Business ContinuityEndpoint Protection how-to Download the unified endpoint management (UEM) platform enterprise buyer’s guide By Bob Violino Jul 26, 20241 min Mobile SecurityEndpoint ProtectionEnterprise Buyer’s Guides podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jul 17, 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jul 17, 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO