Welcome to Our Blog

In-depth security analysis, news, and advice

Jul 18

2017

The Latest and Greatest on ICS Security

Last week we joined the SANs Institute in their “State of Industrial Control Systems Security” webinar. They provided an overview of the data collected in their 4th annual survey on this topic. SANS...

Jul 11

2017

On the Record: HCIC Task Force Report to Congress

First Wannacry and now Petya. These recent global attacks are not just big headlines, but big risks as well. They demonstrate how Cybercrime is moving beyond data theft and ransomware. The Petya...

Jun 30

2017

When it Comes to IoT, Risk Managers Want to Come to the (Third-) Party

In the Cybersecurity market, we have noticed that there isn’t a much discussion of the risks when third-parties deploy IoT devices in the enterprise. We turned to the findings of a recent Ponemon...

Jun 22

2017

Embracing Change at the Summit

We just returned from the 2017 Gartner Security & Risk Management Summit, held in National Harbor, MD. It’s a great conference and this year there was plenty of new research and insights. They...

Jun 14

2017

When NAC Deployment Projects Fail

Deploying a network access control (NAC) solution is one approach to reduce your risk of a network breach. At the same time, it’s accepted wisdom that not all NAC projects are successful. A scrapped...

Jun 08

2017

IT vs. OT in IoT - Connecting the Shop Floor with the Top Floor

IoT and Industry 4.0 are radically changing the way manufacturers are doing business. There is a trend towards optimizing the manufacturing process through automation, IoT and IT. The real time...

Jun 01

2017

Is Your Enterprise Facing an IoT Invasion?

Our recent on-demand webinar with John Pescatore, SANS Emerging Security Trends Director and Ty Powers, Great Bay Software Technical Product Manager, outlines an actionable plan to shore up your IoT...

May 26

2017

An IoTastic Show: IoT World 2017 Recap

IoT World 2017 wrapped late last week with over 10,000 attendees. The Great Bay Software team attended the show and was pleased to meet many of you at the show. If you weren’t lucky enough to attend...

May 09

2017

8 Best Practices for IoT Data Security

The data streaming from connected devices can be revealing. A person’s physical location, the amount of fuel used by a car, the amount of medicine dispensed by an infusion pump, the images from a...

May 02

2017

7 Key Considerations to Ensure the Security of Your IoT Devices

The Internet of Things (IoT) can bring operational efficiencies, new business insights and satisfy needs that we didn’t even know we had. But ensuring the success of an IoT deployment depends on...

Subscribe to Blog Updates