previous arrow
next arrow
Slider

Blog

By Jalal Bouhdada

To tackle cyber risks in healthcare, the European Union will introduce a tightened system of rules for medical equipment in 2020. The Medical Device Regulation will assure purchasers for healthcare institutions that any new equipment meets strict cybersecurity requirements, and reduces the chance of hackers breaking into pacemakers, MRIs or

By Vivek Kumar

These days the Internet of Things (IoT) is multiplying at a rapid pace as more connected devices are hitting the consumer, commercial, and industrial markets. However, this proliferation has also created a new ground for cyber criminals seeking actively to compromise IoT devices with injecting malware. Considering a report, almost

By Jessica Groopman

The rise of mobile ushered in a new era of cybersecurity threats and altered the nature of endpoint security. Whereas enterprises typically managed traditional endpoints, such as laptops, today’s system admin of mobile is the end user. But even this shift in user and technical composition pales in comparison to

By Katie Donegan

Cybersecurity information sharing mutually benefits public and private parties, alerting them to new intelligence on risks and defense tactics. After all, the more information available to security teams, the better equipped they are to make decisions about threat defense and response. In order to create collaborative public-private partnerships for information

By Vicki Livingston

5G, the next generation of mobile wireless technology, brings greater speed, enabling more data capacity; lower latency, enabling more critical communications and responsiveness; and the ability to connect a lot more devices at once for the massive IoT. But what does it mean for security? The fact that 5G will

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.