Blog
Cybersecurity in a time of coronavirus
March 11, 2020
0 Comment
By Ranica Arrowsmith
Tax season is one of the peak times of the year for cybercrime. Part of the reason the season can be so lucrative for cybercriminals is because of the increased vulnerability of human targets — many people depend on their tax return to pay bills, and so are easy victims
How to Enable Proactive Cybersecurity in Health Care as Threats Proliferate
March 11, 2020
0 Comment
By Chris Preimesberger
During the past few decades, the health-care industry has integrated more digital systems, amassed more digital data, and automated clinical workflows. This has caused the industry to become a more attractive target to cyber adversaries while clinicians have become more dependent on these digital systems.On the other hand, cyber threats
By Wayson Vannatta
The role of the chief information officer is changing dramatically. A decade ago, CIOs were charged with managing and protecting an organization’s network perimeter, intellectual property and IT assets. Often viewed as a compulsory cost center, a traditional CIO’s work was generally preventative and reactive. Since then, major industry trends
Fundamentals of IoT Security
March 10, 2020
0 Comment
By Eric Heiser
As IoT applications become mission critical, security is paramount, By their very nature, IoT ecosystems are vulnerable to security threats at multiple levels. Faced with a constantly evolving landscape, an agile approach to security is required by developers of IoT ecosystems, in order to respond rapidly to emerging threats. Both device
By Stoel Rives
According to Crowdstrike’s most recent Global Threat Report, in 2019 they observed that malware-free attacks – attacks where malicious files are not written to disk – outpaced malware attacks by 51% to 49%. In Malware-free attacks, the attackers leverage Tactics, Techniques and Procedures (TTPs) that are less likely to be