previous arrow
next arrow
Slider

Blog

By Ranica Arrowsmith

Tax season is one of the peak times of the year for cybercrime. Part of the reason the season can be so lucrative for cybercriminals is because of the increased vulnerability of human targets — many people depend on their tax return to pay bills, and so are easy victims

By Chris Preimesberger

During the past few decades, the health-care industry has integrated more digital systems, amassed more digital data, and automated clinical workflows. This has caused the industry to become a more attractive target to cyber adversaries while clinicians have become more dependent on these digital systems.On the other hand, cyber threats

By Wayson Vannatta

The role of the chief information officer is changing dramatically. A decade ago, CIOs were charged with managing and protecting an organization’s network perimeter, intellectual property and IT assets. Often viewed as a compulsory cost center, a traditional CIO’s work was generally preventative and reactive. Since then, major industry trends

Fundamentals of IoT Security

 March 10, 2020    0 Comment

By Eric Heiser

As IoT applications become mission critical, security is paramount, By their very nature, IoT ecosystems are vulnerable to security threats at multiple levels. Faced with a constantly evolving landscape, an agile approach to security is required by developers of IoT ecosystems, in order to respond rapidly to emerging threats. Both device

By Stoel Rives

According to Crowdstrike’s most recent Global Threat Report, in 2019 they observed that malware-free attacks – attacks where malicious files are not written to disk – outpaced malware attacks by 51% to 49%. In Malware-free attacks, the attackers leverage Tactics, Techniques and Procedures (TTPs) that are less likely to be

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.