- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- How to keep your smartphone (and its data) secure
- Espionage outpacing financial crime as better reporting improves security picture: Verizon
- Today's Approach to Security is Broken
- Microsoft confirms HTTP Strict Transport Security for IE 12
physical security in pictures
An analysis of satellite communication gear from more than a half-dozen major manufacturers has uncovered critical vulnerabilities that could be exploited to disrupt military operations and ship and aircraft communications.
Tesla Motors accounts are protected only by simple passwords, making it easy for hackers to potentially track and unlock cars, according to a security researcher.
Texas-based semiconductor firm Freescale Semiconductor has confirmed that 20 employees, 12 of them Malaysian nationals, are among the 239 passengers and crew on the vanished Malaysia Airlines flight MH370, which lost contact with Subang Air Traffic Control at 2.40am local time (8 March 2014).
A mobile app for smartphones and tablets delivers step-by-step procedures for responding to incidents from hurricanes to on-campus shooters, serving as Cliffs Notes for Miami-Dade College faculty and staff facing crisis situations.
The lone actor
That's how much has been spent on the 2014 Winter Olympic Games in Sochi, Russia so far, with the final tab projected to be even higher. Though various elements factor into this being the costliest Olympics ever -- to put things into perspective, China spent $40 billion on the 2008 Summer Olympics -- security is a big one.
In 1993, Private Investigator Joe Seanor had wrapped up employment stints in the CIA and the Department of Justice, and was looking for something new in his professional life.
The Project: Deploy mobile communications software to enable transmission of live video to and from the Port of Los Angeles' control centers and harbor police in the field. The project is part of a $4.2 million integrated command console system designed to improve security responsiveness at the nation's busiest cargo port.
Chemical giant Dow brings free chemical-spill education and awareness to emergency responders who might otherwise be left untrained.
If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?
Sign up now »
Get powerful mobile security capabilities, and protect the data the various mobile devices inside your organization.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.