Insights
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy.
Deconstructing Vendor AI Exaggerations
Artificial intelligence and machine learning are guiding research, accelerating product development, improving security and more across numerous industries including our nation’s most critical infrastructures. However, many vendors camouflage true capabilities through...
Cyberspace Solarium Commission Recommends US Cybersecurity Overhaul
The Cyberspace Solarium Commission (CSC) has released a report that suggests US cybersecurity policy is in need of drastic changes. The 182-page report is the result of a yearlong congressional study led by a bipartisan group of lawmakers. It calls for a policy...
Breach Blog: NASA’s Jet Propulsion Laboratory (JPL)
In 2018, NASA’s Jet Propulsion Lab (JPL) — a federally-funded research and development center that manages multiple deep space missions for NASA — was breached by hackers using a cheap, build-it-yourself Raspberry Pi computer. But that’s just the tip of the iceberg....
Breach Blog: The Texas Ransomware Attack
Prep your systems and local governments. 2019 is the year of government-targeted ransomware. At least 22 Texas towns were recently hit by a malicious, coordinated ransomware attack – the first of its kind to hit the public sector. It’s unclear at this time how the...
Small Business, Big Target: Does My SMB Need Cybersecurity?
Small and midsized business owners are obviously aware of the threat of cyber attacks. You read about them in newspapers or hear about them on news reports. Everyone knows about the attacks on big companies including Yahoo, eBay, Equifax, Target Stores, JP Morgan...
Different Cybersecurity Frameworks
There are numerous challenges to building and managing an information security program. Organizations need to comply with industry regulations, state directives and even international statutes in some cases. Cybersecurity frameworks offer a way to address your cyber...