Welcome to Our Blog

In-depth security analysis, news, and advice

Sep 18

2017

Enabling Audits and Cybersecurity Compliance

In common with the larger financial services industry, credit unions also continue to be a top target for cyberattacks. The risks are high and the consequences are costly. Given this, the NCUA...

Sep 07

2017

Delivering Significant IoT Security Enhancements

Expanded Network Infrastructure Support, Enhanced UX and Data Reporting and Advanced MAC Spoofing Detection We recently announced our Beacon Product Suite version 5.2. With this release, we deliver...

Aug 30

2017

The Department of Homeland Security and IoT

There are fundamental challenges with IoT device architecture that have limited the integration of on-board security mechanisms. For the most part, developers and manufacturers have not felt inclined...

Aug 17

2017

It’s Always Sunny in Philadelphia

It’s Always Sunny in Philadelphia Healthcare Informatics, an-online publication, hosts a series of Health IT Summits across the country. We just returned from the Philadelphia Conference. We had...

Aug 10

2017

Is Your IoMT Security Keeping up with Regulatory Mandates?

Securing healthcare networks and devices is not just critical to operational continuity but to regulatory compliance as well. Compliance can be a veritable alphabet soup of mandates: HIPAA mandates...

Aug 02

2017

How’s the Health of Your Security Budget?

A recent Harvard Business Review article1 reminds us that the healthcare sector is the most heavily-targeted vertical industry. Read more in our earlier “Top Target” post. In 2016, more than 25% of...

Jul 26

2017

Banking on the “Fin-ternet” of Things

Especially among millennials, smartphones and mobility are becoming the foundation of financial services. This is having a profound effect on the relationship between banks and their customers....

Jul 18

2017

The Latest and Greatest on ICS Security

Last week we joined the SANs Institute in their “State of Industrial Control Systems Security” webinar. They provided an overview of the data collected in their 4th annual survey on this topic. SANS...

Jul 11

2017

On the Record: HCIC Task Force Report to Congress

First Wannacry and now Petya. These recent global attacks are not just big headlines, but big risks as well. They demonstrate how Cybercrime is moving beyond data theft and ransomware. The Petya...

Jun 30

2017

When it Comes to IoT, Risk Managers Want to Come to the (Third-) Party

In the Cybersecurity market, we have noticed that there isn’t a much discussion of the risks when third-parties deploy IoT devices in the enterprise. We turned to the findings of a recent Ponemon...

Subscribe to Blog Updates