Surprising Findings in K-12 on Campus and at Home
Device vulnerabilities are exposing K-12 school districts to attack and cyber criminals have wasted no time in exploiting them, having even gone so far as to demand ransoms from school districts. In this blog we’ll share some first hand and very surprising findings from recent experiences working with K-12 school ... Read More
Surprising findings: K-12 vulnerabilities.
Device vulnerabilities are exposing K-12 school districts to attack and cyber criminals have wasted no time in exploiting them, having even gone so far as to demand ransoms from school districts. In this blog we’ll share some first hand and very surprising findings from recent experiences working with K-12 school ... Read More
5 Questions CISOs Must Ask When Addressing the New WFH Reality
When it comes to the new work from home reality, all CISO’s must take a new look at how they can ensure that their remote employees can remain productive, while also keeping the business secure. In order to do so, security teams need to have tools which provide a unified ... Read More
Don’t Let Zerologon Be the Master of Your Domain
CISA has issued an alert about the vulnerability dubbed Zerologon which exploits a vulnerability in Microsoft’s Netlogon Remote Protocol and can be utilized to take over Active Directory (AD) Domain Controllers. The exploit is significant given the prevalence of AD useage for authentication in most enterprises. Key to addressing the ... Read More
Armis Announces Integration with ServiceNow Service Graph
Armis is an agentless, passive platform that discovers every asset in your environment, analyzes device behavior to identify risks or attacks, and protects your critical business information and systems. ServiceNow Service Graph is the next-generation system of record for your infrastructure, application, and service data that helps you better manage ... Read More
Interim Rule Implements Section 889 Ban on Contractors Using Certain Telecoms Equipment
One of the biggest threats to our national security is that hostile nation-states could exploit vulnerabilities to access our government’s systems and data. Increasingly, the devices we all rely on -- including the United States Federal government -- are manufactured in countries considered potentially or even actively hostile towards our ... Read More
The Armis Edge: Better Alignment with CIS Critical Security Controls
The Center for Internet Security (CIS) Critical Security Controls have developed a reputation for being both effective and practical. In this blog you will learn how the Armis agentless device security platform can help you apply the Critical Security Controls to all types of devices, including the many kinds of ... Read More
Amid Spike in Hospital Attacks, More Must Be Done To Safeguard Medical Devices
When connected devices and sensors run from the pipeline to IP phone or the drill rig to the board room, we can no longer remain focused on the OT device alone in our security strategy. Attackers see one large enterprise, with many possible attack vectors and pivot points. Security teams ... Read More
COVID-19 Contact Tracing for Healthcare Workers
Read this blog to learn how healthcare organizations can use contact tracing via the network to identify any staff members who have been exposed to the coronavirus ... Read More

