Hackers Take Over Security Cameras Around The World

Hackers Take Over Security Cameras Around The World

|
A group of hackers breached security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools ... Read More
How to Quickly Diagnose Silver Sparrow Infections

How to Quickly Diagnose Silver Sparrow Infections

|
Researchers at Red Canary recently discovered that Macs have been hit with a new malware strain dubbed Silver Sparrow that has been specifically compiled to run on Apple’s custom M1 processors. This new strain demonstrates that an M1 chip won't necessarily protect you from this type of malware. Armis can ... Read More
Surprising findings: K-12 vulnerabilities.

Surprising findings: K-12 vulnerabilities.

|
Device vulnerabilities are exposing K-12 school districts to attack and cyber criminals have wasted no time in exploiting them, having even gone so far as to demand ransoms from school districts. In this blog we’ll share some first hand and very surprising findings from recent experiences working with K-12 school ... Read More
Surprising Findings in K-12 on Campus and at Home

Surprising Findings in K-12 on Campus and at Home

|
Device vulnerabilities are exposing K-12 school districts to attack and cyber criminals have wasted no time in exploiting them, having even gone so far as to demand ransoms from school districts. In this blog we’ll share some first hand and very surprising findings from recent experiences working with K-12 school ... Read More
5 Questions CISOs Must Ask When Addressing the New WFH Reality

5 Questions CISOs Must Ask When Addressing the New WFH Reality

|
When it comes to the new work from home reality, all CISO’s must take a new look at how they can ensure that their remote employees can remain productive, while also keeping the business secure. In order to do so, security teams need to have tools which provide a unified ... Read More
Don’t Let Zerologon Be the Master of Your Domain

Don’t Let Zerologon Be the Master of Your Domain

|
CISA has issued an alert about the vulnerability dubbed Zerologon which exploits a vulnerability in Microsoft’s Netlogon Remote Protocol and can be utilized to take over Active Directory (AD) Domain Controllers. The exploit is significant given the prevalence of AD useage for authentication in most enterprises. Key to addressing the ... Read More
Armis Announces Integration with ServiceNow Service Graph

Armis Announces Integration with ServiceNow Service Graph

|
Armis is an agentless, passive platform that discovers every asset in your environment, analyzes device behavior to identify risks or attacks, and protects your critical business information and systems. ServiceNow Service Graph is the next-generation system of record for your infrastructure, application, and service data that helps you better manage ... Read More
Interim Rule Implements Section 889 Ban on Contractors Using Certain Telecoms Equipment

Interim Rule Implements Section 889 Ban on Contractors Using Certain Telecoms Equipment

|
One of the biggest threats to our national security is that hostile nation-states could exploit vulnerabilities to access our government’s systems and data. Increasingly, the devices we all rely on -- including the United States Federal government -- are manufactured in countries considered potentially or even actively hostile towards our ... Read More
The Armis Edge: Better Alignment with CIS Critical Security Controls

The Armis Edge: Better Alignment with CIS Critical Security Controls

|
The Center for Internet Security (CIS) Critical Security Controls have developed a reputation for being both effective and practical. In this blog you will learn how the Armis agentless device security platform can help you apply the Critical Security Controls to all types of devices, including the many kinds of ... Read More
Amid Spike in Hospital Attacks, More Must Be Done To Safeguard Medical Devices

Amid Spike in Hospital Attacks, More Must Be Done To Safeguard Medical Devices

|
When connected devices and sensors run from the pipeline to IP phone or the drill rig to the board room, we can no longer remain focused on the OT device alone in our security strategy. Attackers see one large enterprise, with many possible attack vectors and pivot points. Security teams ... Read More