Insights Copy - ThreatWarrior

Insights

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy.

Deconstructing Vendor AI Exaggerations

Deconstructing Vendor AI Exaggerations

Artificial intelligence and machine learning are guiding research, accelerating product development, improving security and more across numerous industries including our nation’s most critical infrastructures. However, many vendors camouflage true capabilities through...

Breach Blog: NASA’s Jet Propulsion Laboratory (JPL)

Breach Blog: NASA’s Jet Propulsion Laboratory (JPL)

In 2018, NASA’s Jet Propulsion Lab (JPL) — a federally-funded research and development center that manages multiple deep space missions for NASA — was breached by hackers using a cheap, build-it-yourself Raspberry Pi computer. But that’s just the tip of the iceberg....

Breach Blog: The Texas Ransomware Attack

Breach Blog: The Texas Ransomware Attack

Prep your systems and local governments. 2019 is the year of government-targeted ransomware. At least 22 Texas towns were recently hit by a malicious, coordinated ransomware attack – the first of its kind to hit the public sector. It’s unclear at this time how the...

Small Business, Big Target: Does My SMB Need Cybersecurity?

Small Business, Big Target: Does My SMB Need Cybersecurity?

Small and midsized business owners are obviously aware of the threat of cyber attacks. You read about them in newspapers or hear about them on news reports. Everyone knows about the attacks on big companies including Yahoo, eBay, Equifax, Target Stores, JP Morgan...

Different Cybersecurity Frameworks

Different Cybersecurity Frameworks

There are numerous challenges to building and managing an information security program. Organizations need to comply with industry regulations, state directives and even international statutes in some cases. Cybersecurity frameworks offer a way to address your cyber...