Physical Security Threats (that are often overlooked)

Imagine that you’ve been tasked to secure a server storing restricted information. Some of the tools you will use might include: AI-powered endpoint protection solution, Next-Generation Firewall, network segregation, privileged accounts, MFA etc. Voila! It’s now secure. You go home happy with a sense of accomplishment only to discover the next morning that someone walked … Continue reading Physical Security Threats (that are often overlooked)