Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices

Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late 2023, there has been a notable increase in attacks on…

Posted in Uncategorized | Tagged , , , | Comments Off on Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices

Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions – is immense, which means the potential cyber attack surface is…

Posted in Uncategorized | Tagged , , , | Comments Off on Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst of growth, forcing companies to increasingly rely on it to…

Posted in Uncategorized | Tagged , , , , , | Comments Off on The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

It Is Time for Smart Cyber Requirements for the Water Sector

Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for critical infrastructure, and the need for a strategic shift. Among…

Posted in Uncategorized | Tagged , , , , | Comments Off on It Is Time for Smart Cyber Requirements for the Water Sector

Looking Past DevOps: AI, ClickOps and Platform Engineering

About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams…

Posted in Uncategorized | Tagged , , , , , , | Comments Off on Looking Past DevOps: AI, ClickOps and Platform Engineering

The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare

In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there has been an unspoken but critical vulnerability in the healthcare…

Posted in Uncategorized | Tagged , , , , | Comments Off on The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare

How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert

It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime targets – cybercriminals have and continue to be largely financially-motivated….

Posted in Uncategorized | Tagged , , , , | Comments Off on How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert

Eliminating the Last Mile Between Security Data and Decision Making

Once upon a time, when we used to have to go to physical stores to get the products we needed, there was no such thing as the retail “last mile”…

Posted in Featured | Tagged , , , , | Comments Off on Eliminating the Last Mile Between Security Data and Decision Making

Mitigating Data Breaches with AI-Driven Security Solutions

SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become…

Posted in Featured | Tagged , , , , | Comments Off on Mitigating Data Breaches with AI-Driven Security Solutions

The Dual Nature of Ransomware Attacks

Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial…

Posted in Featured | Tagged , , , , | Comments Off on The Dual Nature of Ransomware Attacks

The Other Lesson from the XZ Utils Supply-Chain Attack

“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in the case of the recent XZ Utils case, it was…

Posted in Uncategorized | Tagged , , , , | Comments Off on The Other Lesson from the XZ Utils Supply-Chain Attack

Artificial Intelligence in 2024

Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so far as to call it the “revolution of work.” Unfortunately,…

Posted in Featured | Tagged , , , | Comments Off on Artificial Intelligence in 2024

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X