Search Results for: security system Blog Post US Government Looking to Fill Cybersecurity Jobs December 27, 2021 Recently, the US Department of Homeland Security announced a new recruitment system, the Cybersecurity Talent Management System (CTMS), aimed at... Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find... Blog Post The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... Blog Post Importance of Information Systems Documentation for Security – What, How, and Why to Document? July 9, 2020 Today, the risk of security incidents and potential breaches is higher than ever before. Breaches affect large numbers of financial... Blog Post Cyber Security Plan for Industrial Control Systems March 10, 2020 What is an Industrial Control System? An industrial control system (ICS) is a control system that is associated with the... Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This... Blog Post Crypto.com Admits $35 Million Hack January 27, 2022 A massive crypto attack occurred on January 17, affecting 483 users of Crypto.com – one of the most ambitious cryptocurrency... Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to... Blog Post Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... Blog Post Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have... Blog Post Apple’s Craig Federighi Thinks DMA Will Open A “Pandora’s Box of Malware January 7, 2022 During this year’s Web Summit, a technology conference that is held annually in Lisbon, Portugal, Apple’s Craig Federighi, the Senior... Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Blog Post How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape... Blog Post Over 9 million Android Devices Infected by Trojan Disguised as Game Apps December 21, 2021 An info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over... Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,...
Blog Post US Government Looking to Fill Cybersecurity Jobs December 27, 2021 Recently, the US Department of Homeland Security announced a new recruitment system, the Cybersecurity Talent Management System (CTMS), aimed at...
Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find...
Blog Post The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...
Blog Post Importance of Information Systems Documentation for Security – What, How, and Why to Document? July 9, 2020 Today, the risk of security incidents and potential breaches is higher than ever before. Breaches affect large numbers of financial...
Blog Post Cyber Security Plan for Industrial Control Systems March 10, 2020 What is an Industrial Control System? An industrial control system (ICS) is a control system that is associated with the...
Blog Post USB Sticks Can Cause Cyber Security Breaches December 28, 2019 Were you ever bringing in a USB Drive from home and then plugging it back into your work computer? This...
Blog Post Crypto.com Admits $35 Million Hack January 27, 2022 A massive crypto attack occurred on January 17, affecting 483 users of Crypto.com – one of the most ambitious cryptocurrency...
Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to...
Blog Post Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement...
Blog Post Understanding The Common Vulnerability Scoring System August 10, 2020 A vulnerability is a weakness in hardware, software, personnel, or procedures. However, not all vulnerabilities are equal. Some vulnerabilities have...
Blog Post Apple’s Craig Federighi Thinks DMA Will Open A “Pandora’s Box of Malware January 7, 2022 During this year’s Web Summit, a technology conference that is held annually in Lisbon, Portugal, Apple’s Craig Federighi, the Senior...
Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Blog Post How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape...
Blog Post Over 9 million Android Devices Infected by Trojan Disguised as Game Apps December 21, 2021 An info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over...
Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,...