Five High-Profile Watering Hole Attacks Highlight Importance of Network Security

Digital criminals use various techniques to breach organizations’ computer systems. One method that continues to be popular among cybercriminals is watering hole attacks. The name is derived from how predatory animals tend to lurk around watering… Continue reading Five High-Profile Watering Hole Attacks Highlight Importance of Network Security

Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security

It’s possible: Smart lighting could be the most dangerous element in your company’s network. By 2025, there will be 75 million IoT devices in use. Smart devices are now found throughout most commercial offices, yet a lack of security could … Continue reading Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security

Think Your Business Is Too Small to Get Hacked? Wake Up!

Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply too great. SMBs need to strengthen their digital security. Uber…Equifax…Yahoo…if you look only at the head… Continue reading Think Your Business Is Too Small to Get Hacked? Wake Up!

The Asynchronous Nature of Asymmetric Cyberwarfare: Success Factors of Cyberattacks

Winning against an asymmetric cyberattack first requires we recognize an attack is occurring It has been given many names: soft war, non-linear war, unconventional hybrid warfare, cyber cold war, Cold War 2.0, Code War. Regardless of the name, one thi… Continue reading The Asynchronous Nature of Asymmetric Cyberwarfare: Success Factors of Cyberattacks