The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that...
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a...
No business or organization wants to be the victim of a cybersecurity attack. Adversaries target organizations of all sizes and in every industry, so cyber security...
Guardicore has discovered a new attack vector on Comcast’s XR11 voice remote that would have allowed attackers to turn it into a listening device – potentially invading your...
In the wake of the Colonial Pipeline cyberattack and an ensuing Executive Order, a renewed focus is being given to the strength and resiliency of our...
On May 7, 2021, Colonial Pipeline’s 5,500-mile east coast pipeline halted its mainline production when administrators detected advanced ransomware. This attack – the most disruptive cyberattack...
Open source code is ubiquitous in modern software. While its convenience supports the demand for faster application development, it is also at risk of being insecure....
Overcome human nature with a “lock the door” mentality The ‘human factor’ has been recognized as the weakest link in creating safe and secure digital environments...
Perhaps the most talked-about job in the information technology world these days is that of the chief information security officer (CISO) – the man or woman...
According to a report released by Honeywell, improving cybersecurity for operational technology (OT) systems ranks as one of the top priorities for surveyed facility managers over...
Recent Comments