The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
The Defense Department’s supply chain is vulnerable to the infiltration of counterfeit parts, potentially jeopardizing the lives of American soldiers, according to two Democratic senators. In an August 6 letter
Goodwin House, a continuing care retirement community in Virginia, wanted to provide additional security to its residents with a higher-tech but still user-friendly solution. With the help of access control
The Department of Homeland Security is quietly creating specialized teams of experts to test industrial control systems at U.S power plants for cybersecurity weaknesses. An August 4 Associate Press report
The embattled Federal Protective Service (FPS) should take steps to standardize building security measures at federal facilities by working with the tenants of those buildings to define structures, operations, and
A laser or “lighted object” was reported in the sky at O’Hare Airport as Air Force One was departing the night of August 5, an airport official said. The airport
Securities regulators in Pennsylvania and other states are warning investors to keep an eye out for “mutations of old schemes and themes” as con artists seek to profit from new
A provocative commentary by Frank J. Cilluffo and F. Jordan Evert of the Homeland Security Policy Institute at George Washington University -- Clad in army fatigues, holding an AK-47, and
A security researcher demonstrated his homegrown RFID-reading equipment at both Black Hat USA and Defcon 18 to illustrate the lack of security in the Electronic Product Code (EPC) Class 1
Hartsfield-Jackson International Airport in Atlanta has amassed a small collection of bomb-disposal robots and later this year will add a fifth one capable of maneuvering narrow airplane aisles and checking
A new report published by Gartner Research places emphasis on another use for mobile technology in the financial transaction chain — as a security layer for user authentication via global