ICS Security
Oddly enough, one of the last sectors to accept security technology was industrial systems. For years industrial systems stuck with proprietary protocols and software managed and monitored by humans and not connected to a more extensive network. Because nothing could get in or out, hackers weren’t attacking the system. There were little vulnerabilities back then, […]
Cybersecurity Controls are the next Frontier of the Evolving Cyberattack Surface (Part 2)
In this post, we break down what the recently-discovered FireEye and supply chain attack shows about your cyberattack surface. The above figure shows what we know so far about the stages of the FireEye attack. To summarize the above diagram, Russian attackers compromised SolarWinds and used their trusted software, Orion IT, as the vehicle to […]
Cybersecurity Controls are the next Frontier of the Evolving Cyberattack Surface
“Change is the only constant.” — Heraclitus Your cyberattack surface is the part of the computing environment that can be leveraged by an attacker to take advantage of any vulnerabilities. It is the part of your computing network that is exposed. This can include any code, software, or hardware that is added to the environment. […]
Container Security 2021
With 2020 (thankfully) coming to a close, it’s time to focus on 2021. The world took a financial bullet from the Coronavirus, which leaves bad actors hungry. Sketchy people and shady organizations will be doing everything in their power to get money. That means every company, big or small, needs to take their cybersecurity seriously, […]
Why SecureIQLab Was Established
The security landscape is drastically changed in the Post-COVID world. Before the pandemic, the journey towards cloud adoption was proceeding with casual speed. But now, business adoption of cloud and cloud-based technology has accelerated due to the change in workforce dynamics created by the surge in remote workspace (Zoom, WebEx, etc.) and remote workplace (bring […]
