About 16 results
Open links in new tab
  1. Exploring the Intersection of Physical Security and Cybersecurity

    IFSEC Global, Staff March 29, 2022 6 Min Read Source: Pitinan Piyavatin via Alamy Stock Photo

  2. Why the Insider Threat Will Motivate Cyber and Physical Teams to ...

    Jan 11, 2022 · It's hard to have a crystal ball in the world of security, but if one were to make a safe prediction, it's this: Organizations will need to further integrate their cybersecurity and …

  3. Hikvision Network Cyber-Protect Helps Ensure Physical …

    Feb 22, 2022 · Hikvision’s Network Cyber-Protect is one of several initiatives we will be launching in 2022 to further demonstrate and maintain trustworthiness with our growing base of users …

  4. IFSEC Seeks Security Pros for New Survey on Physical Access Control

    Jan 27, 2022 · Take part in an IFSEC Global survey to better understand the state of access control in 2022.

  5. Cyber-Physical Security: What It Is and What You Should Do

    Jan 25, 2022 · Morey J. Haber, Chief Security Advisor, BeyondTrust January 25, 2022 5 Min Read Source: JIRAROJ PRADITCHAROENKUL via Alamy Stock Photo

  6. Why Retail Stores Are More Vulnerable Than Ever to Cybercrime

    IFSEC Global, Staff October 26, 2022 5 Min Read Source: Cavan Images via Alamy Stock Photo

  7. How Can Security Partnerships Help to Mitigate the Increasing …

    Jun 14, 2022 · IFSEC Global Staff, Part of the Informa Network June 14, 2022 5 Min Read Source: Brain light via Alamy Stock Photo

  8. AUVSI Launches Green UAS Cybersecurity Certification Program …

    Feb 23, 2023 · This launch also builds on the collaboration AUVSI announced with DIU in September 2022 to further commercial cyber methodologies to build a shared requirement.

  9. Is Your Home or Small Business Built on Secure Foundations?

    IFSEC Global, Staff July 27, 2022 5 Min Read Source: JIRAROJ PRADITCHAROENKUL via Alamy Stock Photo

  10. Researchers Detail Spoofing Attack Against Vehicle GPS

    Jul 17, 2018 · A new paper shows that with the right amount of hardware and know-how, an attacker can spoof a vehicle's GPS system and change the route.