Blog
Automating Security With Intelligence
April 22, 2020
0 Comment
By Karen Levy
Automation is part and parcel of modern society. From chatbots on websites to self-parking vehicles, more or less anything can be automated — including cybercrime. Threat actors use automation for a whole range of activities necessary for the cyber kill chain, from reconnaissance to exfiltration. The efficiency that automation affords
By Chris
We live in an age where privacy is hard to come by. If you go online, you’ve got sites tracking your every move. Even offline, your privacy is limited – every company you deal with wants to collect that valuable personal information. This article is about Data privacy of IoT
6 Key Considerations for IoT Security by Design
April 22, 2020
0 Comment
By Chris Hickman
It’s no secret that Internet-connected devices need security to protect data – and the device itself – from compromise. However, in many cases, IoT products are not engineered with sufficient security to defend against today’s threats. Other times, hardware manufacturers make mistakes implementing their own security controls, such as the
Deepfakes and AI: Fighting Cybersecurity Fire with Fire
April 21, 2020
0 Comment
By Brian Foster
To successfully mitigate evolving attacks, security teams must use the exact same AI tools that create those attacks in the first place. Today, the most successful and damaging cyberattacks are executed by highly professional criminal networks rather than “lone-wolf” hackers. These criminal organizations have also become highly adept at leveraging
Enterprises Need To Focus On IoT Security
April 20, 2020
0 Comment
By Radoslaw Kotewicz
A number of exciting technological advancements – 5G, Wi-Fi 6, cloud and virtualization of networks, to name a few – are fueling growth in the Internet of Things (IoT) beyond what was imagined even a few years ago. A recent study shows that in 2018, there were almost 18 billion