www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7863
Public Scan
Submitted URL: https://www.darkreading.com/physical-security//
Effective URL: https://www.darkreading.com/physical-security
Submission: On January 07 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/physical-security
Submission: On January 07 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Securing Your APIs: What You Need to Know Jan 25, 2022 * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Securing Your APIs: What You Need to Know Jan 25, 2022 * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Securing Your APIs: What You Need to Know Jan 25, 2022 * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. Event Beyond Passwords: New Thinking and Strategies for Authentication | January 27 Webinar | <REGISTER NOW> Event Securing Your APIs: What You Need to Know | January 25 Webinar | <REGISTER NOW> Event Beyond Spam and Phishing: Emerging Email-based Threats | January 18 Webinar | <REGISTER NOW> PreviousNext PHYSICAL SECURITY Lights Out: Cyberattacks Shut Down Building Automation Systems Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them. December 20, 2021 Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them. by Kelly Jackson Higgins, Executive Editor December 20, 2021 9 min read Attacks/Breaches Article Why Red Teaming While Black Can Be Risky Penetration audits can be dangerous for people of color. Here is how to keep Black and brown cybersecurity professionals safe during red team engagements. December 09, 2021 Penetration audits can be dangerous for people of color. Here is how to keep Black and brown cybersecurity professionals safe during red team engagements. by Williesha Morris, Contributing Writer December 09, 2021 6 min read Edge Articles Article Claroty Raises $400M More, Acquires Healthcare IoT Security Firm Medigate Industrial control systems security firm reaches $635M in funding with this Series E round. December 08, 2021 Industrial control systems security firm reaches $635M in funding with this Series E round. by Dark Reading Staff, Dark Reading December 08, 2021 1 min read IoT Article USB Devices the Common Denominator in All Attacks on Air-Gapped Systems A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there. December 03, 2021 A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there. by Jai Vijayan, Contributing Writer December 03, 2021 6 min read Attacks/Breaches Article How Threat Actors Get Into OT Systems The convergence and integration of OT and IT has resulted in a growing number of cyber-risks for critical infrastructure. Here are some of the ways attackers are targeting operational technology systems. November 24, 2021 The convergence and integration of OT and IT has resulted in a growing number of cyber-risks for critical infrastructure. Here are some of the ways attackers are targeting operational technology systems. by Donovan Tindill, senior cybersecurity strategist, Honeywell November 24, 2021 5 min read Edge Articles Article The Old Ways Aren’t Working: Let’s Rethink OT Security Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back. November 16, 2021 Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back. by Fahmida Y. Rashid, Features Editor, Dark Reading November 16, 2021 8 min read DR Tech Article 3 Must-Know Technologies to Protect Your Hybrid Workforce Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users. November 15, 2021 Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users. by Mary Blackowiak, Lead Product Marketing Manager, AT&T Cybersecurity November 15, 2021 5 min read The Cyber Future Article What Happens If Time Gets Hacked Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure. November 11, 2021 Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure. by Kelly Jackson Higgins, Executive Editor November 11, 2021 3 min read Vulnerabilities/Threats Article Top Hardware Weaknesses List Debuts CWE list aimed at designers and programmers to avoid key hardware weaknesses early in product development. October 28, 2021 CWE list aimed at designers and programmers to avoid key hardware weaknesses early in product development. by Dark Reading Staff, Dark Reading October 28, 2021 1 min read Vulnerabilities/Threats Article Gas Stations in Iran Downed by Cyberattack Unknown attackers hijacked gasoline pump machines and defaced them with a message that reportedly included a phone number for Supreme Leader Ayatollah Ali Khamenei's office. October 26, 2021 Unknown attackers hijacked gasoline pump machines and defaced them with a message that reportedly included a phone number for Supreme Leader Ayatollah Ali Khamenei's office. by Dark Reading Staff, Dark Reading October 26, 2021 1 min read Attacks/Breaches Article Name That Toon: Bone Dry Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. October 19, 2021 Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. by John Klossner, Cartoonist October 19, 2021 1 min read Attacks/Breaches Article NSA, FBI, CISA Issue Advisory on 'BlackMatter' Ransomware Ransomware has become a "national security issue," NSA director said. October 18, 2021 Ransomware has become a "national security issue," NSA director said. by Dark Reading Staff, Dark Reading October 18, 2021 2 min read Threat Intelligence Article China's Hackers Crack Devices at Tianfu Cup for $1.5M in Prizes China's premier hackers will target web browsers, operating systems, mobile devices, and even a car at Tianfu Cup. October 15, 2021 China's premier hackers will target web browsers, operating systems, mobile devices, and even a car at Tianfu Cup. by Dark Reading Staff, Dark Reading October 15, 2021 2 min read Vulnerabilities/Threats Article US Water and Wastewater Facilities Targeted in Cyberattacks, Feds Warn CISA, FBI, and NSA issue advisory and defense practices to help these utilities thwart "ongoing" threats targeting IT and OT networks. October 14, 2021 CISA, FBI, and NSA issue advisory and defense practices to help these utilities thwart "ongoing" threats targeting IT and OT networks. by Dark Reading Staff, Dark Reading October 14, 2021 2 min read Attacks/Breaches Article What the CEO Saw: Colonial Pipeline, Accellion Execs Share Cyberattack War Stories CEOs of the two breached companies said their priorities instantly shifted to joining the response efforts when they first learned of attacks on their systems. October 07, 2021 CEOs of the two breached companies said their priorities instantly shifted to joining the response efforts when they first learned of attacks on their systems. by Kelly Jackson Higgins, Executive Editor October 07, 2021 6 min read Threat Intelligence Article DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept