If the utility grid becomes compromised, how will the critical infrastructure that supports companies and operations across the globe maintain availability?
Subex’s AI-first solution to replace the operator’s legacy system
September 21, 2022
In order to sustain its market leadership by providing high-quality and innovative offerings, Ethio Telecom wanted to enhance and broaden its risk management strategy by having a holistic defense mechanism.
This is the company’s third chiller to earn cybersecure assurance
September 16, 2022
Working to minimize emissions while making the most of the energy used, the YMC2 chiller requires less energy consumption, reducing the energy production and the resulting carbon emissions.
A unified IT and physical security team can develop a comprehensive security program based on a common understanding of risk, responsibilities, strategies, and practices.
The attachment system allows office workers to easily install a 3M Privacy Filter to their full-screen (frameless) monitor to protect their work, remove it for collaboration with co-workers, and then reattach when done. This is particularly important in highly regulated vertical industries with sensitive data, like legal, health care, government, finance, and consulting.
As some of you already know, I am currently enrolled in a graduate program at New York University to earn my master's degree in cybersecurity. My main interest is in digital forensics, so this has been my focus when it comes to research projects.
Securing infrastructure in a federal agency environment is not optional — complying with STIGs is mandatory for all Department of Defense agencies and the contractors that work with them.
Netwrix study reveals manufacturing organizations experienced account compromise and supply chain attacks more often than any other industry surveyed
September 2, 2022
Netwrix announced additional findings for the manufacturing sector from its global 2022 Cloud Security Report. According to the survey, half (51%) of manufacturing companies experienced an attack on their cloud infrastructure within the last 12 months.
ISO/IEC 27001 certification highlights the integrity of an organization’s data and systems, and its commitment to information security.
August 26, 2022
With ransomware attacks rising more than 50% in 2021 and signs of even greater cyber risk on the horizon, effective, enterprise-wide cybersecurity must be a priority for every organization.