newsApple patches exploits used in spy campaign ‘Operation Triangulation’Apple has released fixes for both the new and the affected versions of iOS.By Shweta Sharma22 Jun 20233 minsMalwareSurveillance news analysis Russia points finger at US for iPhone exploit campaign that also hit Kaspersky LabBy Lucian Constantin02 Jun 20235 minsAdvanced Persistent ThreatsMalwareSurveillancefeature The hidden security risks in tech layoffs and how to mitigate themBy Andrada Fiscutean01 May 20238 minsCSO and CISOIntellectual PropertyHiring opinionThe classified document leak: let's talk about Jack Teixeira's need-to-knowBy Christopher Burgess 18 Apr 20237 minsMilitaryGovernmentData and Information Security news analysisSpyware vendors use exploit chains to take advantage of patch delays in mobile ecosystemBy Lucian Constantin 31 Mar 20236 minsMobile SecuritySurveillanceZero-day vulnerability news analysisBiden administration seeks to tamp down the spyware market with a new banBy Cynthia Brumfield 27 Mar 20235 minsRegulationRegulationGovernment newsFrance bans TikTok, all social media apps from government devicesBy Michael Hill 27 Mar 20233 minsGovernmentSurveillanceData and Information Security news analysisSurge of swatting attacks targets corporate executives and board membersBy Cynthia Brumfield 08 Feb 20236 minsData and Information SecurityPhysical Security opinionWhat CISOs need to know about the renewal of FISA Section 702By Christopher Burgess 07 Feb 20236 minsRegulationGovernmentSurveillance Articlesnews analysisAustralia's physical-security specialists looking to take on information securityThe convergence of physical and information security is pushing CISOs towards new roles and new partnerships.By David Braue 29 Sep 2021 6 minsCSO and CISOData and Information SecurityPhysical SecurityfeatureThe CSO role today: Responsibilities and requirements for the top security jobThe CSO is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.By Josh Fruhlinger 20 May 2021 13 minsCSO and CISOData and Information SecurityPhysical SecurityfeatureWhat is doxing? Weaponizing personal informationDoxing victims find their home address, social security number, and more posted online, typically because someone wanted to intimidate, humiliate, or harass them. Here's what you need to know.By Josh Fruhlinger 31 Aug 2020 10 minsCyberattacksPhysical SecuritySecurityfeatureHow drones affect your threat modelAs use of unmanned aerial vehicles grows, organizations should have a plan for managing the risk associated with drones, whether or not they deploy them, experts say.By Jaikumar Vijayan 03 Aug 2020 10 minsPhysical SecurityRisk ManagementSecurityfeatureThe clean desk testTen ways a messy desk puts confidential information at risk.By Joan Goodchild 22 Jan 2019 5 minsPhysical SecuritySecurityopinionMore AI, consolidation and regionalization coming in 2019It’s that time of year again, when we look back to look ahead. The 2019 security landscape holds new promise, threats, developments and opportunities to collectively tackle the issues our industry faces.By Rick Grinnell 26 Nov 2018 5 minsTechnology IndustryData and Information SecurityPhysical SecurityfeatureThe state of ICS and IIoT security in 2019Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it. By Dan Swinhoe 12 Nov 2018 5 minsInternet of ThingsPhysical SecuritySecurityopinionRemember: It's not all about the 1s and 0sDon't forget the role of physical security in protecting your assets…even the digital onesBy Bob Bragdon 07 Nov 2018 4 minsPhysical SecuritySecuritynews analysisHacking smart buildingsForget about internet-connected toasters. Your "intelligent" office building is one giant, vulnerable IoT device.By J.M. Porup 05 Sep 2018 7 minsInternet of ThingsPhysical SecuritySecurity InfrastructureopinionOur electric grid is vulnerable to cyberattacks. Here's what we need to doAs more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major catastrophe.By Rick Grinnell 27 Aug 2018 6 minsCyberattacksCritical InfrastructurePhysical SecurityopinionWhere Chicken Little meets information securityOutside of a movie theater, your plane won’t be hacked out of the sky.By Ben Rothke 14 Aug 2018 12 minsCyberattacksHackingTechnology IndustryopinionKeeping the Stars and Stripes secureSome of the most pressing threats to our national security are found not in the physical world, but in cyberspace. It's past time for our nation to adapt to the changing landscape and bring our security infrastructure up to speed.By Chris Wysopal 15 Jun 2018 5 minsGovernment ITGovernmentTechnology Industry Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime