California IoT security law: What it means and why it matters

In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months on January 1, 2020. While the goal of the law is to better address the risks … Continue reading California IoT security law: What it means and why it matters

Want to build a successful SOC? Here’s what you need to know

There is no arguing the fact that networks are continually growing in complexity and the cyberattack surface is constantly expanding. A critical step in building a stronger security posture and more robust data protection strategy is a 24×7 facili… Continue reading Want to build a successful SOC? Here’s what you need to know

Speeding MTTR when a third-party cloud service is attacked

We all know you can’t stop every malicious attack. Even more troublesome is when an externally sourced element in the cloud – engaged as part of your infrastructure – is hit and it impacts customers using your digital service. That’s what h… Continue reading Speeding MTTR when a third-party cloud service is attacked

November 2019 Patch Tuesday Forecast: Out with the old, in with the new

There are only two more Patch Tuesday’s before the new year, but we already have something new to experience this November. Windows 10 version 1909, named the November 2019 Update, was released recently on MSDN. Unlike previous fall releases, this one … Continue reading November 2019 Patch Tuesday Forecast: Out with the old, in with the new

5 factors to consider when choosing an encryption key management system

Data breaches are at an all-time high with 2019 looking to one of the worst on record for data loses. Within the data security battle, encryption is considered to be the gold standard that provides protection through the whole data lifecycle. With that… Continue reading 5 factors to consider when choosing an encryption key management system

Want to overcome patching challenges once and for all? Automation is the key

The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent Beaming report, UK businesses faced cyberattacks every 50 seconds in the sec… Continue reading Want to overcome patching challenges once and for all? Automation is the key

How to remove human error from the cyber risk equation

In attempting to fortify the enterprise’s cyber assets, we have turned much of our attention to human error. After all, the vast majority of hackers rely upon their exploitation of employees to break through corporate defenses, anticipating that these … Continue reading How to remove human error from the cyber risk equation

Microsegmentation for refining safety systems

When the TRITON (aka TRISIS) attack struck three refining sites in the Middle East in November of 2017, it was the first known cyber incident to target safety instrumented systems (SIS), specifically Schneider Electric’s Triconex gear. The consequences… Continue reading Microsegmentation for refining safety systems

Build or buy: What to consider when deploying on-premise or cloud-based PKI

Public Key Infrastructure (PKI), once considered an IT table stake, has transformed from a tool used to protect websites to a core digital identity management function within the cybersecurity framework. Today’s PKI establishes and manages digital iden… Continue reading Build or buy: What to consider when deploying on-premise or cloud-based PKI

Unmask cybercriminals through identity attribution

Organized crime has grown more complex since the turn of the century—coinciding with the rise of the digital world, cybercriminals have leveraged the proliferation of technology to broaden their reach with a more sophisticated network-structured model,… Continue reading Unmask cybercriminals through identity attribution