If You Give a Hacker a Storm… Nick Cappi March 22, 2023 Cybercriminals take advantage of misfortunes such as natural disasters. Businesses should plan and prepare to ensure cyber strength during storms. Read More
Department of Commerce regulates CHIPS program funding Security Staff March 21, 2023 Rules have been proposed for the CHIPS Incentives Program by the Department of Commerce to ensure funded technology is not used for malign purposes. Read More
Cybersecurity threats to medical devices are a growing concern Richard Staynings March 21, 2023 Healthcare needs a security strategy that involves the implementation of controls that compensate for unpatched vulnerabilities of at-risk devices.Read More
CISA starts ransomware vulnerability pilot program Security Staff March 20, 2023 CISA announces the Ransomware Vulnerability Warning Pilot to help determine vulnerabilities commonly associated with known ransomware exploitation.Read More
Maryland school district implements gun detection technology Security Staff March 17, 2023 Charles County Public Schools in Maryland is utilizing new active shooter detection and notification technology to improve school safety. Read More
As biometrics adoption surges, anti-spoofing is non-negotiable Richard Carriere March 17, 2023 As the world moves toward biometrics, systems must be paired with advanced anti-spoofing to ensure faces & voices aren't as hackable as passwords. Read More
2023 cybersecurity outlook: Crime keeps on slippin’ into the future Aamir Lakhani March 16, 2023 Security leaders around the world should anticipate that cybercrime and ransomware attacks will continue to increase in popularity in 2023. Read More
Department of State receives funding for semiconductor development Security Staff March 16, 2023 The Department of State implements new funding to address security objectives through new programs and initiatives for semiconductor development.Read More
Balancing security & agility in today's networks is a continuous effort John Moran March 16, 2023 Enterprises must establish processes to mitigate existing risk and reduce future risk. These processes must be run continuously and in parallel. Read More
Now is the time to prioritize cybersecurity Darren Guccione March 15, 2023 Taking a pervasive approach to cybersecurity that achieves visibility, security and control across the entire organization is non-negotiable. Read More