ICS Security
Oddly enough, one of the last sectors to accept security technology was industrial systems. For years industrial systems stuck with proprietary protocols and software managed and monitored by humans and…
Oddly enough, one of the last sectors to accept security technology was industrial systems. For years industrial systems stuck with proprietary protocols and software managed and monitored by humans and…
In this post, we break down what the recently-discovered FireEye and supply chain attack shows about your cyberattack surface. The above figure shows what we know so far about the…
“Change is the only constant.” -- Heraclitus Your cyberattack surface is the part of the computing environment that can be leveraged by an attacker to take advantage of any vulnerabilities.…
With 2020 (thankfully) coming to a close, it's time to focus on 2021. The world took a financial bullet from the Coronavirus, which leaves bad actors hungry. Sketchy people and…
The security landscape is drastically changed in the Post-COVID world. Before the pandemic, the journey towards cloud adoption was proceeding with casual speed. But now, business adoption of cloud and…