by Pete Slade | Mar 4, 2021 | Breaches, Supply Chain Threat Detection
The SolarWinds attack was a pivotal moment for cybersecurity, proving that sophisticated threat actors could breach an organization through their trusted security supply chain. (1) The recent Qualys attack — in which cybersecurity firm Qualys suffered a data...
by Pete Slade | May 13, 2020 | Critical Infrastructure
Cyberattacks involving Internet of Things (IoT) devices are surging at an unprecedented rate. Our hyper-connectivity and reliance on IoT devices provide myriad conveniences, but they also create cybersecurity blind spots across consumer markets and enterprises. IoT...
by Pete Slade | Mar 27, 2020 | Machine Learning
Artificial intelligence and machine learning are guiding research, accelerating product development, improving security and more across numerous industries including our nation’s most critical infrastructures. However, many vendors camouflage true capabilities through...
by Pete Slade | Mar 13, 2020 | Critical Infrastructure
The Cyberspace Solarium Commission (CSC) has released a report that suggests US cybersecurity policy is in need of drastic changes. The 182-page report is the result of a yearlong congressional study led by a bipartisan group of lawmakers. It calls for a policy...
by Pete Slade | Oct 16, 2019 | Breaches
In 2018, NASA’s Jet Propulsion Lab (JPL) — a federally-funded research and development center that manages multiple deep space missions for NASA — was breached by hackers using a cheap, build-it-yourself Raspberry Pi computer. But that’s just the tip of the iceberg....