Blog Posts Tagged with "Physical Security"


Gaining Access to a Check Point Appliance

February 07, 2012 Added by:Bill Mathews

On any Linux-based system with an unencrypted hard drive, it is possible to completely overtake a system once you have gained physical access. Often this is easily accomplished with a live CD distribution, such as Backtrack or Ubuntu and some command line tools...

Comments  (0)


Data Loss Doesn’t Always Mean Getting Hacked

February 03, 2012 Added by:Robert Siciliano

Recently UCLA announced 16,000 patients were potential victims of identity theft because a doctor’s home office was broken into and data stolen. Data breaches cost big bucks. Encryption in this scenario failed due to a password on a sticky note near the laptop...

Comments  (0)


From PwnPlugs to Nuclear Power Plants...

January 03, 2012 Added by:Malgorzata Skora

Physical security can’t be overstated with high value targets such as the Nuclear Power plants in Iran and the U.S. Governments Secret SIPR networks being victims to physical layer compromise. If there’s one guaranteed way to gain access to any network, it’s with a physical layer exploit...

Comments  (0)


Data Loss Prevention - Step 3: Engage Physical Security

December 20, 2011 Added by:Rafal Los

While often missed, this component of security is one of the most critical when it comes to understanding, and fighting the loss of data in your organization in a very real, tangible way. There are three types of threats you want to be aware of from the physical perspective...

Comments  (0)


The Case for an Open Source Physical Security Software

January 18, 2011 Added by:Guy Huntington

The open source formula usually delivers free software with a low yearly license. Use of this software should lower enterprises overall physical security budget over time as opposed to paying proprietary vendors large purchase amounts and annual license fees...

Comments  (0)


The Psychology of Data Security

November 15, 2010 Added by:Danny Lieberman

The cultural phenomenon of companies getting hit by data breaches but not adopting technology countermeasures to mitigate the threat requires deeper investigation but today, I’d like to examine the psychology of data security and data loss prevention...

Comments  (0)


Google Ordered to Produce Name of Cyberstalker

November 15, 2010 Added by:Robert Siciliano

Information Week reports that a New York judge has ordered Google to reveal the identity of a cyberstalker who has anonymously posted video and messages on the Internet. The videos included sexual slurs and damaging information that could affect the woman’s reputation and career...

Comments  (0)


Got Go Bag? Musings on Physical Security

September 10, 2010 Added by:shawn merdinger

While we most often think about security issues from the information protection viewpoint on Infosec Island, it's useful to review physical security scenarios. If you had to get up now and leave because of an emergency, what would you bring with you to survive for 72 hours with no support?

Comments  (2)


GreenIT Innovations: Micro-Modular Data Centers

August 23, 2010 Added by:Anthony M. Freed

What do you get when you cross a server rack with a Cadillac? How about with a tank? EMS launched its Micro-Modular Data Centers at the UPTIME Institute’s Green IT Conference, and industry leaders praised the units as being one of the Greenest IT solutions on the market...

Comments  (0)


Getting Physical: Hot Summer Security

July 16, 2010 Added by:Pete Herzog

OSSTMM 3 requires that you don't look to the threat to prepare your security plan because it's too easy to only make changes which affect a small portion of the threats. That's especially true when you consider how unpredictable human behavior can be...

Comments  (10)


10 Personal Safety and Security Tips

April 10, 2010 Added by:Robert Siciliano

Fundamentals: Body language is 55% of communications. That’s your walk, posture, facial expressions and eye contact. Awareness is being alert to your surroundings at all times. Intuition is when the hair on the back of your neck stands on end. Voice tone and pitch equal 35% of communications. The way a person communicates physically and verbally can determine whether or not a predator deems ...

Comments  (6)