opinionThe classified document leak: let’s talk about Jack Teixeira’s need-to-knowThe release of classified documents by a US Air National Guardsman highlights how important it is for CISOs to consider who should have access to sensitive data and why.By Christopher Burgess18 Apr 20237 minsMilitaryGovernmentData and Information Security feature Cybersecurity researchers face real-life threatsBy Andrada Fiscutean21 Jun 202212 minsPhysical SecurityRisk Managementopinion Apple AirTag and other tagging devices add to CISO worriesBy Christopher Burgess03 Feb 20225 minsCybercrimePhysical Security news analysisAustralia’s physical-security specialists looking to take on information securityBy David Braue 29 Sep 20216 minsCSO and CISOData and Information SecurityPhysical Security featureThe CSO role today: Responsibilities and requirements for the top security jobBy Josh Fruhlinger 20 May 202113 minsCSO and CISOData and Information SecurityPhysical Security featureHow drones affect your threat modelBy Jaikumar Vijayan 03 Aug 202010 minsPhysical SecurityRisk ManagementSecurity featureThe clean desk testBy Joan Goodchild 22 Jan 20195 minsPhysical SecuritySecurity opinionMore AI, consolidation and regionalization coming in 2019By Rick Grinnell 26 Nov 20185 minsTechnology IndustryData and Information SecurityPhysical Security featureThe state of ICS and IIoT security in 2019By Dan Swinhoe 12 Nov 20185 minsInternet of ThingsPhysical SecuritySecurity ArticlesopinionRemember: It’s not all about the 1s and 0sDon't forget the role of physical security in protecting your assets…even the digital onesBy Bob Bragdon 07 Nov 2018 4 minsPhysical SecuritySecuritynews analysisHacking smart buildingsForget about internet-connected toasters. Your "intelligent" office building is one giant, vulnerable IoT device.By J.M. Porup 05 Sep 2018 7 minsInternet of ThingsPhysical SecuritySecurity InfrastructureopinionOur electric grid is vulnerable to cyberattacks. Here’s what we need to doAs more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major catastrophe.By Rick Grinnell 27 Aug 2018 6 minsCyberattacksCritical InfrastructurePhysical SecurityopinionWhere Chicken Little meets information securityOutside of a movie theater, your plane won’t be hacked out of the sky.By Ben Rothke 14 Aug 2018 12 minsCyberattacksHackingTechnology IndustryopinionKeeping the Stars and Stripes secureSome of the most pressing threats to our national security are found not in the physical world, but in cyberspace. It's past time for our nation to adapt to the changing landscape and bring our security infrastructure up to speed.By Chris Wysopal 15 Jun 2018 5 minsGovernment ITGovernmentTechnology IndustryopinionCyber games at the World Cup 2018Analysis of cyberthreats at the World Cup looking back at cyberattacks from the last tournament and predictions for this year.By Martin McKeay 11 Jun 2018 6 minsTechnology IndustryCyberattacksPhysical Securitynews analysisInformation security in a war zone: How the Red Cross protects its dataThe International Committee of the Red Cross faces unique and extreme security threats across the globe. Technology is not always the best defense.By J.M. Porup 08 Jun 2018 7 minsPhysical SecuritySecurityfeatureHow Facebook protects data with physical securityFacebook takes an integrated approach to keeping data safe. Even the company’s office buildings are designed to put physical protection between servers and the public.By Terena Bell 30 May 2018 5 minsPhysical SecuritySecurityopinionIBM and thumb drives: epoxy or beacons?Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.By Salvatore Stolfo 14 May 2018 4 minsData and Information SecurityNetwork SecurityPhysical SecurityopinionBridging the realms between cyber and physical securityCan there be better automated incident response for physical security? By Rick Grinnell 11 Apr 2018 4 minsTechnology IndustryData and Information SecurityPhysical Securitynews analysisInsecure by design: What you need to know about defending critical infrastructurePatching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.By J.M. Porup 07 Mar 2018 14 minsAdvanced Persistent ThreatsCritical InfrastructureNetwork SecurityopinionHow to ensure that giving notice doesn’t mean losing dataThe employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive. By Isaac Kohen 13 Feb 2018 4 minsTechnology IndustryAccess ControlData and Information Security Show more Show less View all Resources whitepaper From Risk to Resilience: Cyber Vaulting Essentials for IT Leaders As enterprise IT landscapes evolve, it gets harder to safeguard your organization from cyber threats. But fortifying your defenses has never been more pressing. The post From Risk to Resilience: Cyber Vaulting Essentials for IT Leaders appeared first on Whitepaper Repository –. By Cohesity Inc. 17 Jun 2024Backup and RecoveryCyberattacksData and Information Security whitepaper AI for IT Leaders: Deploying a Future-Proof IT Infrastructure By Digital Realty Trust, L.P. 30 May 2024Artificial IntelligenceBusiness OperationsDigital Transformation whitepaper How Intelligent Business Systems Help Drive Profitability and Growth in Hospitality By Workday Inc. 02 Apr 2024Other View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature CSO Awards 2024 showcase world-class security strategies By CSO events 17 Jun 20241 min CSO50IDG Events feature 2024 CSO Hall of Fame honorees By CSO events 17 Jun 20244 mins Data and Information SecurityRisk ManagementCareers news India faces evolved cyber espionage with novel Discord hack By Shweta Sharma 17 Jun 20243 mins Hacker GroupsMalware podcast CSO Executive Sessions India with Hilal Lone, CISO, Razorpay 11 Jun 202429 mins CSO and CISO podcast CSO Executive Sessions: The new realities of the CISO role – whistleblowing and legal liabilities 28 May 202417 mins CSO and CISO podcast CSO Executive Sessions India with Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International 22 May 202426 mins CSO and CISO video CSO Executive Session India with Hilal Lone, CISO, Razorpay 11 Jun 202429 mins CSO and CISO video CSO Executive Sessions: The new realities of the CISO role – whistleblowing and legal liabilities 28 May 202417 mins CSO and CISO video CSO Executive Sessions India with Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International 22 May 202426 mins CSO and CISO