-
Securing the Growing Attack Surface Introduced by IoTs
Spurred by digitization and substantial advances in artificial intelligence (AI) and machine learning (ML), the number of Internet of Things (IoT) devices is increasing at breakneck speeds. Every minute, 7,620 new IoT devices are added to the Internet, and by 2030, there will be more than 29 billion connected IoT devices. While IoT devices enhance an organization’s efficiency…
-
A Different Kind of Threat – Hacktivism in a Connected World
Is there ever a circumstance when committing a crime can be justified? Picture a scenario where authorities apprehend an individual for hacking into a massive database and publishing the exfiltrated data. As he is put into cuffs, the defendant states, “It was for a good cause.” This defense could very likely be the creed of…
-
Ransomware Strikes Manufacturers: Growing Threats to IP and Downtime
The manufacturing industry has found itself on the front lines of a relentless and escalating battle against ransomware attacks in recent years. These malicious threats are being launched at manufacturers of all sizes, and attacks no longer stop with data encryption. While causing downtime through operational and manufacturing disruption remains the most impactful way for…
-
Mastering the Alert Storm – The Security Alert Management Process
Securing a home mortgage for a residential property can be an overwhelming experience given the sheer volume of paperwork involved. Amidst the myriad pages requiring your signature and initials, it’s easy to lose sight of the details you’re consenting to. This is where a closing attorney steps in to guide and elucidate. In today’s digital…
-
Maintaining Operations, Connectivity, and Security in the Manufacturing Sector
Build it and they will come. Not only is it the famous line from a movie, but it also rings true for cybercriminals. In this case, it isn’t what is being built, but the manufacturing process itself that attracts nefarious characters. A 2022 study conducted by IBM showed that no industry is targeted by cyber…
-
Why the Financial Sector Is Especially Vulnerable to the Insider Sabotage Threat
In the 2008 crime comedy movie Mad Money, three women with menial jobs at the Federal Reserve Bank of Kansas City plot to steal money from the branch. Each works in a different department, but by leveraging their work responsibilities and unique access to areas of the building, they’re able to pull off their theft…