Physical Security

What's Next in the Ablyazov Saga? French Court Set to Rule on Extradition

What's Next in the Ablyazov Saga? French Court Set to Rule on Extradition

Mukhtar Ablyazov, the businessman and banker, once Kazakhstan’s minister of energy, industry and trade, has been pursued on various corruption charges through the courts of several nations since 2009. The latest chapter has seen Ablyazov’s case stalled in French courts as the country’s legal mechanisms churn over whether to extradite the downfallen tycoon to Russia. In 2013, French...

Dutch Sports Authority may Track Offenders by Fingerprint, GPS

Dutch Sports Authority may Track Offenders by Fingerprint, GPS

The current system of manually checking the blocked citizens in on football game day is cumbersome. The Netherlands' governing football association KNVB will roll out a device soon that tracks banned fans using GPS and biometrics. Offenders simply put their finger on its scanner, and its internal GPS makes sure they're nowhere near the stadium during a match. It's a solution with privacy concerns

'Binary bandit' has been Stealing Only 0s and 1s from Philadelphia Homes

'Binary bandit' has been Stealing Only 0s and 1s from Philadelphia Homes

Someone has been stealing 0s and 1s from the address numbers on the front of buildings in Philadelphia. The thieves, or 'binary bandits' as locals are calling them, have hit up at least a dozen houses, says CBS Philly. The theory seems to be that it's for some sort of performance art or installation, though probably there are other, more legal means of acquiring numbers for a purpose like that.

Progress of a ‘Cameras Are Everywhere’ Society

Progress of a ‘Cameras Are Everywhere’ Society

It is amazing that we are practically surrounded by cameras. Cameras are everywhere. This is not meant to make you paranoid; it’s just to make you aware that there are fewer places in public that are private. We cannot undo this progress, and while we can control what we do as part the new privacy paradigm, we need to also consider other ways to operate within this new privacy-constrained realm.

Flare is an AI Home Security System that Recognizes Friend from Foe

Flare is an AI Home Security System that Recognizes Friend from Foe

A German startup called BuddyGuard recently launched an AI security system called Flare. Flare is part camera, part AI, part IoT accessory. The wall-mounted camera monitors your home, while the machine vision algorithm inside of it helps detect and catalog faces. Geolocation tells the device if you’re coming or going. It can distinguish between normal noises and suspicious sounds around the...

Why are We So Afraid?

Why are We So Afraid?

For an expert perspective on one aspect of national security, Ido Kilovaty, a Cyber Fellow at Yale University’s Center for Global Legal Challenges, emailed The Atlantic regarding “the exaggeration of the cyberterrorism threat”: "The amount of hype and literature on cyberterrorism far exceeds its present known effects. Cyberterrorism has so far killed or seriously harmed zero people," he...

DHS Merging Cyber and Physical Security

DHS Merging Cyber and Physical Security

As hackers steal data from political campaigns, health insurance giants and even the CIA director’s personal email account, agencies & businesses are becoming hyper alert to cyber defense. DHS is now rethinking its cyber strategies and looking for ways to link cyber and physical defense. At DHS, security capabilities "have grown up in stove pipes", but the two realms can no longer be distinct.

Germany: National Crisis Plan, First Overhaul in 2 Decades

Germany: National Crisis Plan, First Overhaul in 2 Decades

Germany has told its citizens to stock up on water and food in the event of a terrorist attack or national catastrophe and may consider re-introducing conscription in its first overhaul of civil defenses in 2 decades. The strategy outlines precautionary steps for scenarios such as terrorism and chemical weapons and cyber attacks. The Interior Ministry says it is not linked to an immediate threat.

  • More at CNBC
  • |
  • |
The Fading Line Between Cyber and Physical Threats

The Fading Line Between Cyber and Physical Threats

Every day, the line between cyber-threats and physical threats grows thinner – blurring the crucial distinction between attacks on networks and attacks on materials objects. The rise of loT has expanded this threat from nation-state interactions out into the realm of cyber-enabled crime against companies and individuals. But not all experts have a pessimistic view of the current state of...

A Federal Response to Cyber / Physical Threats

A Federal Response to Cyber / Physical Threats

Supply chain threats to cyber/physical systems are the next great challenge. The cornerstone of federal cybersecurity efforts is FISMA. The security emphasis of much of the federal government, where driven by FISMA, has been to protect info and info systems. Cyber/physical threats change the paradigm. With the internet of things (IoT), both the scale and urgency of the problem increase.

The Atlantic: Is America Any Safer?

The Atlantic: Is America Any Safer?

Yes, we’re safer from the kind of orchestrated attack that shocked us on September 11th 2001. But we have not plugged some threatening security gaps. However, today, all U.S. security agencies share the same watch lists and threat databases, which are constantly updated. They share intelligence tips with one another, and federal officials even sit on task forces with their local counterparts.

Here are the People Who Protect America's Critical Infrastructure

Here are the People Who Protect America's Critical Infrastructure

In the DHS’ organization chart, issues like cyber attacks on the power grid fit under critical infrastructure protection. A team of 600 federal employees and 400 contractors lead by Caitlin Durkovich, gives companies advice on protecting themselves from attacks. They provide security surveys and advice to proprietors of everything from major-league ballparks to water plants to banks.

This List Will Help you Painlessly Recover From Disaster

This List Will Help you Painlessly Recover From Disaster

Consider these tips when under attack: 1. Have a disaster recovery blueprint set aside; 2. Keep your DR plan fresh; 3. Test you DR plan at least once a year; 4. Know what level of data protection your business requires; 5. Architect your most important applications according to recovery point; 6. Set a recovery time; 7. Enable frequent share recovery; 8. Check storage replication and; many more.

  • More at CSO
  • |
  • |

Read about the cyber physical systems security and other physical threats

The expertly curated news published under this category aims to cater to the needs of emerging challenges wherein in cyber security is intricately linked to physical security of an individual and the entire state. It is being anticipated that computer systems will be used by malicious state and non-state actors to carry out physical attacks. The threat from Internet of Things devices is already well recognized. The terrorists are nowadays making use to cyber systems to cause physical harms for achieving their objectives. The anti-social elements are increasingly becoming cyber armed to conduct robberies. Therefore, it is of utmost importance to keep a continuous watch on the transforming relationship between the cyber and physical space. The role of computer systems in maintaining physical security is also covered under this category. This category broadly covers the cyber security news issues relating to cyber physical systems, physical security, physical threats to computer systems and cyber threats to physical systems.