www.darkreading.com Open in urlscan Pro
2606:4700::6811:7863  Public Scan

Submitted URL: https://www.darkreading.com/physical-security//
Effective URL: https://www.darkreading.com/physical-security
Submission: On January 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Securing Your APIs: What You Need to Know
   Jan 25, 2022
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Securing Your APIs: What You Need to Know
   Jan 25, 2022
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Securing Your APIs: What You Need to Know
   Jan 25, 2022
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 

Event
Beyond Passwords: New Thinking and Strategies for Authentication | January 27
Webinar | <REGISTER NOW>
Event
Securing Your APIs: What You Need to Know | January 25 Webinar | <REGISTER NOW>
Event
Beyond Spam and Phishing: Emerging Email-based Threats | January 18 Webinar |
<REGISTER NOW>
PreviousNext



PHYSICAL SECURITY


Lights Out: Cyberattacks Shut Down Building Automation Systems
Security experts in Germany discover similar attacks that lock building
engineering management firms out of the BASes they built and manage — by turning
a security feature against them.
December 20, 2021
Security experts in Germany discover similar attacks that lock building
engineering management firms out of the BASes they built and manage — by turning
a security feature against them.

by Kelly Jackson Higgins, Executive Editor
December 20, 2021
9 min read

Attacks/Breaches


Article
Why Red Teaming While Black Can Be Risky
Penetration audits can be dangerous for people of color. Here is how to keep
Black and brown cybersecurity professionals safe during red team engagements.
December 09, 2021
Penetration audits can be dangerous for people of color. Here is how to keep
Black and brown cybersecurity professionals safe during red team engagements.

by Williesha Morris, Contributing Writer
December 09, 2021
6 min read

Edge Articles


Article

Claroty Raises $400M More, Acquires Healthcare IoT Security Firm Medigate
Industrial control systems security firm reaches $635M in funding with this
Series E round.
December 08, 2021
Industrial control systems security firm reaches $635M in funding with this
Series E round.

by Dark Reading Staff, Dark Reading
December 08, 2021
1 min read

IoT


Article
USB Devices the Common Denominator in All Attacks on Air-Gapped Systems
A new study of 17 malware frameworks shows threat actors always use USB drives
to sneak malware into air-gapped environments and then steal data from there.
December 03, 2021
A new study of 17 malware frameworks shows threat actors always use USB drives
to sneak malware into air-gapped environments and then steal data from there.

by Jai Vijayan, Contributing Writer
December 03, 2021
6 min read

Attacks/Breaches


Article
How Threat Actors Get Into OT Systems
The convergence and integration of OT and IT has resulted in a growing number of
cyber-risks for critical infrastructure. Here are some of the ways attackers are
targeting operational technology systems.
November 24, 2021
The convergence and integration of OT and IT has resulted in a growing number of
cyber-risks for critical infrastructure. Here are some of the ways attackers are
targeting operational technology systems.

by Donovan Tindill, senior cybersecurity strategist, Honeywell
November 24, 2021
5 min read

Edge Articles


Article
The Old Ways Aren’t Working: Let’s Rethink OT Security
Ransomware attacks against critical infrastructure go beyond locking up data.
They can entirely shut down production in a facility. Here's how AI can help you
fight back.
November 16, 2021
Ransomware attacks against critical infrastructure go beyond locking up data.
They can entirely shut down production in a facility. Here's how AI can help you
fight back.

by Fahmida Y. Rashid, Features Editor, Dark Reading
November 16, 2021
8 min read

DR Tech


Article
3 Must-Know Technologies to Protect Your Hybrid Workforce
Zero-trust, SASE, and XDR have similar goals, but they differ in their
approaches to protecting businesses and users.
November 15, 2021
Zero-trust, SASE, and XDR have similar goals, but they differ in their
approaches to protecting businesses and users.

by Mary Blackowiak, Lead Product Marketing Manager, AT&T Cybersecurity
November 15, 2021
5 min read

The Cyber Future


Article
What Happens If Time Gets Hacked
Renowned hardware security expert raises alarm on the risk and dangers of
cyberattackers targeting the current time-synchronization infrastructure.
November 11, 2021
Renowned hardware security expert raises alarm on the risk and dangers of
cyberattackers targeting the current time-synchronization infrastructure.

by Kelly Jackson Higgins, Executive Editor
November 11, 2021
3 min read

Vulnerabilities/Threats


Article
Top Hardware Weaknesses List Debuts
CWE list aimed at designers and programmers to avoid key hardware weaknesses
early in product development.
October 28, 2021
CWE list aimed at designers and programmers to avoid key hardware weaknesses
early in product development.

by Dark Reading Staff, Dark Reading
October 28, 2021
1 min read

Vulnerabilities/Threats


Article
Gas Stations in Iran Downed by Cyberattack
Unknown attackers hijacked gasoline pump machines and defaced them with a
message that reportedly included a phone number for Supreme Leader Ayatollah Ali
Khamenei's office.
October 26, 2021
Unknown attackers hijacked gasoline pump machines and defaced them with a
message that reportedly included a phone number for Supreme Leader Ayatollah Ali
Khamenei's office.

by Dark Reading Staff, Dark Reading
October 26, 2021
1 min read

Attacks/Breaches


Article
Name That Toon: Bone Dry
Feeling creative? Submit your caption and our panel of experts will reward the
winner with a $25 Amazon gift card.
October 19, 2021
Feeling creative? Submit your caption and our panel of experts will reward the
winner with a $25 Amazon gift card.

by John Klossner, Cartoonist
October 19, 2021
1 min read

Attacks/Breaches


Article
NSA, FBI, CISA Issue Advisory on 'BlackMatter' Ransomware
Ransomware has become a "national security issue," NSA director said.
October 18, 2021
Ransomware has become a "national security issue," NSA director said.

by Dark Reading Staff, Dark Reading
October 18, 2021
2 min read

Threat Intelligence


Article
China's Hackers Crack Devices at Tianfu Cup for $1.5M in Prizes
China's premier hackers will target web browsers, operating systems, mobile
devices, and even a car at Tianfu Cup.
October 15, 2021
China's premier hackers will target web browsers, operating systems, mobile
devices, and even a car at Tianfu Cup.

by Dark Reading Staff, Dark Reading
October 15, 2021
2 min read

Vulnerabilities/Threats


Article
US Water and Wastewater Facilities Targeted in Cyberattacks, Feds Warn
CISA, FBI, and NSA issue advisory and defense practices to help these utilities
thwart "ongoing" threats targeting IT and OT networks.
October 14, 2021
CISA, FBI, and NSA issue advisory and defense practices to help these utilities
thwart "ongoing" threats targeting IT and OT networks.

by Dark Reading Staff, Dark Reading
October 14, 2021
2 min read

Attacks/Breaches


Article
What the CEO Saw: Colonial Pipeline, Accellion Execs Share Cyberattack War
Stories
CEOs of the two breached companies said their priorities instantly shifted to
joining the response efforts when they first learned of attacks on their
systems.
October 07, 2021
CEOs of the two breached companies said their priorities instantly shifted to
joining the response efforts when they first learned of attacks on their
systems.

by Kelly Jackson Higgins, Executive Editor
October 07, 2021
6 min read

Threat Intelligence


Article


DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2022 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept