Search Results for: physical security Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will... Blog Post Schneider Electric PLCs Vulnerability Takes into Consideration Undetectable Remote Takeover August 9, 2021 Researchers at a security platform named Armis have recently discovered a critical Schneider Electric PLCs vulnerability. It poses a threat... Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set.... Blog Post Social Engineering – The Art of Social Hacking February 12, 2020 Social Engineering attack is an art of manipulating people into doing something, rather than by breaking into technical means. These... Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Blog Post What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT... Blog Post Mobile Security Issues Affecting Organizations March 25, 2020 Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of... Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology... Blog Post New DarkVishnya Attack Targets European Banks December 7, 2018 Cybercriminals are using physical devices to access corporate networks by walking into these organizations and attaching the devices to computers.... Blog Post Former Student Destroys University Computers Using A USB Killer April 25, 2019 A former student at the College of Saint Rose destroyed at least 66 University computers using a USB Killer. The... Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to... Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The... Knowledge Center A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will...
Blog Post Schneider Electric PLCs Vulnerability Takes into Consideration Undetectable Remote Takeover August 9, 2021 Researchers at a security platform named Armis have recently discovered a critical Schneider Electric PLCs vulnerability. It poses a threat...
Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set....
Blog Post Social Engineering – The Art of Social Hacking February 12, 2020 Social Engineering attack is an art of manipulating people into doing something, rather than by breaking into technical means. These...
Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
Blog Post What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT...
Blog Post Mobile Security Issues Affecting Organizations March 25, 2020 Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of...
Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology...
Blog Post New DarkVishnya Attack Targets European Banks December 7, 2018 Cybercriminals are using physical devices to access corporate networks by walking into these organizations and attaching the devices to computers....
Blog Post Former Student Destroys University Computers Using A USB Killer April 25, 2019 A former student at the College of Saint Rose destroyed at least 66 University computers using a USB Killer. The...
Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to...
Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The...
Knowledge Center A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption...