Is the Power Grid Getting More Vulnerable to Cyber Attacks?

Read  Jesse Dunietz’s article about how power grids are more vulnerable to cyber attacks on Scientific American : Two weeks ago it was cyberattacks on the Irish power grid. Last month it was a digital assault on U.S. energy companies, including a nuclear power plant. Back in December a Russian hack of a Vermont utility […]

Special events demand strategic security planning

Read why Don Campbell says that companies need strategic security planning for special high profile events on Security Info Watch : High-profile events have always been viewed as high-value targets for potentially malicious acts, making heightened security measures standard operating procedure at large venues around the world. This is particularly applicable for major sporting, entertainment […]

Hospitals must factor patient safety into security strategies

Read why says that CISOs should factor in patient safety into their cyber security and physical security strategies on Healthcare IT News : Hackers have proven they can get through hospital networks into medical and Internet of Things devices, which is why it is crucial that patient safety be prioritized when outlining a security strategy […]

Physical security must-dos for rock-solid network protection

It’s at the hardware level, the very bottom of the networking hierarchy, that your network is most vulnerable. A lost laptop, an open USB port, a simple network tap — all these can be a catalyst for quick and devastating data loss that no firewall can prevent. Read why companies should follow physical security measures […]

Four types of security entrance for solutions that truly fulfill security goals

Read Greg Schreiber four types of security entrance solutions for access management on Source Security : Security and systems integrators across the nation are recommending and providing long-term security solutions to their customers. But when it comes to physical security entrances, integrators can easily fall into the trap of simply fulfilling an end user’s exact request […]

Five things you need to know about executive protection

Read list five things that companies need to know about CEO, CISO, CSO protection on CSO Online : Protecting executives today is about much more than physically shielding them from danger. The cyber security risks are higher than ever, and organizations need to ensure that the network and data access many high-level executives have doesn’t […]

Security reality check: The real threat is closer to home

Organizations and governments often underestimate insider threats and the damage they can do. Read the full article here. Cognitio’s Take: One of the biggest organizational risks to mitigate are trusted individuals with authorized access to, or knowledge of, sensitive data or business operations. These individuals can potentially wittingly or unwittingly damage your business. Mitigating this risk is further complicated […]

Securing Asia’s data centers against physical threats

While no one will refute the importance of physical security within data centers, server racks in data centers here are typically secured using physical keys that are easily duplicated. And, compounding that problem, is the use of a common key to secure large swathes of racks, CK Cheong, CEO of ERS Group, told DCD. Read […]

Facebook Security Boss: Empathy, Inclusion Must Come to Security

Twenty years of Black Hat seemed to be the appropriate marker in time for Alex Stamos to remind security professionals of their unique position to affect change, not only in technology and business, but also in geopolitics and human rights. Read why Alex Stamos of Facebook says that empathy and inclusion should be the key […]

Tackling the cyber security conundrum

Read Marcus Hand’s article about how the merchant navy sector can tackle the cyber security issues facing them on Sea Trade Maritime : A standard bearer for digitalisation in shipping Maersk responded quickly but the company still needed a month to get its systems back fully functioning, highlighting not just the vulnerability of companies in […]