Intelligent physical security system devices—especially AI-enabled video cameras—have become high-value targets for hackers, who now deploy malware explicitly designed to infect these devices and lie ...
(Editor’s note: This article is an installment of the “Real Words or Buzzwords?” series about how real words can become empty words and stifle technology progress.) This article is prompted by several ...
New device designed by the National Cyber Security Centre protects against malicious connections between monitors and laptops ...
Steve Orrin is the federal CTO for Intel Corporation. He has held architectural and leadership positions at Intel, driving strategy and projects on identity, anti-malware, HTML5 security, cloud and ...
Physical security has changed dramatically in a short period of time. Advanced analytics and automation now play a meaningful role in how organizations detect risk, respond to incidents and protect ...
Eric Marchewitz is a field solution architect with a 23-year career in cybersecurity solutions, working for such companies as PGP Security, McAfee, Cisco and Check Point. He is a recovering CISSP and ...
Physical access attacks are no longer edge cases, they are a risk that organizations must actively plan for.
Technology is advancing at warp speed, which presents a significant opportunity (and challenge) for building security. Traditional security systems such as standalone cameras, basic alarms, and ...
Emily Long is a freelance writer based in Salt Lake City. After graduating from Duke University, she spent several years reporting on the federal workforce for Government Executive, a publication of ...
If you’ve managed secure cryptographic infrastructure, you know the challenges of physical secure rooms, from the high cost of SCIF-standard facilities to the operational burdens of multi-operator ...
We’re going to look at some basic security concepts, and I’ve put together a handy PDF guide for you. Think of it as a way to ...