Tag: cybersecurity

Please restart your car in safe mode Your car may not get a “Check Security” light in the future, but it might get an “Update Software” light. In addition to Drive, Reverse, and Park, it may also get a Safe mode with diminished but sufficient functions to get home or to a safe stop in ...
Read Blog
This blog post was written by Raja Patel. Traditional IT security solutions need modifications to successfully defend critical infrastructure on tomorrow's cyber battlefields. There has recently been a great amount of discussion regarding critical infrastructure and its inherent security vulnerabilities. Critical infrastructure primarily comprises aging supervisory control and data acquisition (SCADA) and industrial control systems ...
Read Blog
This blog post was written by Bruce Snell. Next month I’ll be moving back to the US after a few years living in Japan. While moving internationally can be a headache, one of the fun things about it is shopping for a new car. I’ve had my eye on a Jeep Wrangler and have been ...
Read Blog
A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives business. Welcome to the new normal. Corporate cyberespionage made the front page yesterday with the news of Morpho, also known as Wild Neutron. Regardless of what you call it, these revelations were the latest reminder of the growing ...
Read Blog
Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data Breach Investigations Report, two-thirds of ...
Read Blog
As the persistence of insider threats remain a critical issue for government agencies to face. Security leaders like McAfee  have responded by prioritizing solutions that can mitigate insider threats in their pipeline. Government agencies have begun implementing policy changes that can help reduce the risk of an insider threat that can lead to critical data ...
Read Blog
It is important to develop a strong base of contributors who can communicate effectively, answer questions, and summarize issues.  Like many companies today, our success is dependent on the community of customers and partners that grows around our products and services. This community augments and extends our capabilities with complementary products, places to go to ...
Read Blog
A strong defense against compromise involves three layers: hardening devices, securing communications, and monitoring behavior.  If criminals breach data security and steal credit card numbers or personal information, your company suffers loss of reputation and potentially significant intangible costs. If they breach security of your cyber-physical control systems, you could be facing damage or destruction ...
Read Blog