Skip to content



The All-Too-Dumb World of Smart Cities Technology

Smart cities tech runs the gamut from policing tools and transit sensors to educational software and more. But the tech routinely hoovers up sensitive data on city residents, including their movements and audio, video, and biometric data—even before cities know what to do with the data, and even though they may never know what to with it.

The Dual-Use Dilemma: Insights from the Arms Fair

Interception and intrusion cyber capabilities sold by private companies are increasingly being marketed to intelligence and government agencies. New efforts attempt to stop them from winding up in the hands of U.S. and NATO adversaries.

Targeting All Lonely Hearts

Romance scams are easier than ever through social media and online dating, and the schemes can be very profitable for fraudsters.

On the Road to Connectivity

Connected vehicles are quickly taking over the roadway, bringing enhanced safety features and cyber vulnerabilities along with them.

Business Strategy

Five Tools to Drive Cyber Success

Understanding how policies, procedures, and tools impact your security posture is critical. A new report helps shed light on what’s working, what’s not, and how security leaders can adopt best practices with C-suite engagement.

cloud adoption

Cloud in the Crosshairs

Organizations are increasingly embracing opportunities to leverage the cloud, which can create security risks if vulnerabilities are left unaddressed.

Risk Adrift

The vessels the world relies on to ship cargo from one side of the planet to the other are becoming increasingly connected, creating business opportunities and cyber risks for operational technology.

Cyber Lexicon

Cyber 101 for Physical Security Practitioners

When it comes to cybersecurity, there are many terms and concepts that are beneficial for physical security professionals and IT professionals alike to understand. Here are a few to help you get started.

U.S. Government Plays Cyber Catch-Up

Following a series of high-profile cyber incidents, a watchdog highlighted the increasing threat breaches, intrusions, and attacks pose to the U.S. government.

A Cyber Seat at the Table

Nearly half of board members surveyed identified cybersecurity as a top source of risk moving forward. CISOs should expect more scrutiny, support, and resources as a result of the board’s attention.


Spies in the Supply Chain

A massive intrusion into U.S. government and private sector networks shows how nation-state actors are developing supply chain attacks for cyber space.

Stalkerware Fuels Technology-Enabled Abuse

With the proliferation of connected homes, virtual assistants, and smartphones, abusers have more tools than ever to track and control victims. When the workplace enters the home, however, this puts employees and employers at increased risk.

How to Protect an Election

The challenges to secure the 2020 U.S. Presidential Election and its system infrastructure are vast. But so are the new tools in place to help monitor and protect the 2020 election.

The Problem with Patrolling

New research finds that while organizations have made strides to improve data management, they still lack investment in breach detection.

Flight Risks

End users are increasingly adopting unmanned aerial systems for security and operational needs. But they could be introducing cybersecurity risks in flight.

Is Security Converging?

New research by the ASIS Foundation indicates that full convergence of physical security, cybersecurity, and business continuity is not commonplace.

When The Money’s Gone

The longest U.S. government shutdown in history could have major ramifications for the nation’s cybersecurity.

How to Bridge the Gap

Once siloed, cyber and physical security teams are now working together to address corporate risk.

A Warm-Up Election

Following the U.S. midterm elections, officials move their focus to the 2020 presidential election.

The Cost of a Connection

LinkedIn can be a valuable networking and recruitment tool. It can also be used to target employees to obtain corporate secrets.

The Privacy Problem

Private companies come together to demand that authorities create privacy regulations to protect users’ data and technology.


Today in Security: Profile of a Ransomware Target

Research examines the Dark Web advertisements of ransomware perpetuators to build a profile of the ideal target: a U.S.-based company with at least $100 million in revenue not operating in taboo sectors.

Today in Security: CISA Warns of Cloud Service Attacks

The U.S. Cybersecurity and Infrastructure Security Agency issued an alert this week, warning security practitioners of recent cyberattacks against organizations’ cloud services that exploited poor hygiene practices and phishing tactics.

Today in Security: U.S. Laws Address Deepfakes

The recently enacted defense authorization bill and other federal and state laws call for research and begin to codify restrictions on deepfake technology; European countries have not addressed the issue directly.

Today in Security: U.S. Top Cybersecurity Official Fired

U.S. President Donald Trump announced on Twitter Tuesday that he decided to fire Chris Krebs, the director of CISA, which has led the way for federal cybersecurity initiatives, public–private sector information sharing and partnerships, and election security.

Today in Security: World Password Day

The first Thursday of May is designated World Password Day, arguably more important than before as several organizations in various countries have workers operating remotely in response to the COVID-19 pandemic.