previous arrow
next arrow
Slider

Blog

By Wayson Vannatta

The role of the chief information officer is changing dramatically. A decade ago, CIOs were charged with managing and protecting an organization’s network perimeter, intellectual property and IT assets. Often viewed as a compulsory cost center, a traditional CIO’s work was generally preventative and reactive. Since then, major industry trends

Fundamentals of IoT Security

 March 10, 2020    0 Comment

By Eric Heiser

As IoT applications become mission critical, security is paramount, By their very nature, IoT ecosystems are vulnerable to security threats at multiple levels. Faced with a constantly evolving landscape, an agile approach to security is required by developers of IoT ecosystems, in order to respond rapidly to emerging threats. Both device

By Stoel Rives

According to Crowdstrike’s most recent Global Threat Report, in 2019 they observed that malware-free attacks – attacks where malicious files are not written to disk – outpaced malware attacks by 51% to 49%. In Malware-free attacks, the attackers leverage Tactics, Techniques and Procedures (TTPs) that are less likely to be

By Kimberly Underwood

The three-year old Cyber Resiliency Office for Weapons Systems, known as CROWS, created by the National Defense Authorization Act of 2016, has set about making cyber resiliency a part of the U.S. Air Force. As a problem solver for the service, the organization is elevating the cybersecurity of weapons systems,

By Swathi Moorthy

It is not just coronavirus that people have to brace against these days but also the plethora of fake news that has mushroomed since the COVID-19 outbreak. “The attacks will only increase and become more sophisticated in the coming days,” said J Kesavardhanan, Founder, K7 Computing, an endpoint security service

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.