
A New Milestone In Protecting Critical Infrastructure
A New Milestone In Protecting Critical InfrastructureBy Curtis Simpson, CISO This year’s winter in Texas reminded me of a movie I hadn’t seen in years; 1996’s “The Trigger Effect”. The movie paints a highly dramatic picture of the potential domino effect of a lengthy power outage and its impact on ... Read More

Online Ed is the New Corporate Threat Vector
Schools became a major hotspot for cyberattacks as students moved to online learning. In the last 30 days, education was the most targeted sector, receiving more than 60% of all malware encounters, or more than 5 million incidents, according to Microsoft Security Intelligence. The Government Accounting Office wants to know ... Read More

Some cheeses have holes, but your cyber security strategy should not.
Last week we highlighted the fact that breweries have been classified as ‘essential’ in some regions – causing major concern when North America's largest beer maker suddenly ceased production due to a cyberattack. But if you’ve ever been to the Netherlands, you can only imagine the distress when the country’s ... Read More

How to Bring Back Time and Money to the Business
IT and security budgets are mostly earmarked for existing projects - very little is set aside for innovation. So how is an organization able to reduce budget while also improving the state of their company’s security? If they use a purpose-built solution like Armis, they get advantages from eliminating security ... Read More

Hackers Tap into Oldsmar Water Facility
Hackers Tap into Oldsmar Water FacilityBy Curtis Simpson, CISO This week’s attack on a Florida city’s (Oldsmar) water treatment system was not sophisticated, nor were the protection measures that prevented its potentially deadly outcome. That’s what makes this attack so concerning.Because back in July 2020, the NSA and CISA warned ... Read More

The President and the Peloton: A Security Love Story
A recent story in Popular Mechanics discusses the new President and his desire to use a Peloton exercise bike in the White House. As a smart, connected device with internet connectivity, this most innocent of devices is now under review for use by the most powerful person in the world ... Read More

6 Tips to Stay Safe While Gaming Over the Holidays
The Armis platform’s integration with Splunk® extends OT visibility and security for a consolidated view of devices and risks that helps you keep your entire environment protected. It reduces your demand on resources, and the need to add additional tools in the future, by leveraging the Splunk solution your security ... Read More

WastedLocker and the Vulnerability of Our Supply Chain
The ransomware attack targeting smartwatch and wearables maker Garmin in late July highlights the vulnerability of connected IoT devices and the consequences this kind of disruption can have on crucial industries like supply chain, OT and even aviation ... Read More

A CISO Summary on NSA & CISA Alert AA20-205A: Understanding and Meeting Actions To Secure OT and Infrastructure
On Thursday, July 23rd the NSA and CISA issued an urgent joint cybersecurity advisory to all critical infrastructure and services operations that rely upon OT systems to deliver core services ... Read More

Best Practices for Securing a Remote Workforce
Here are eight tips to help security organizations in securing their remote workforce The novel coronavirus COVID-19 is causing global health and economic crises and profoundly impacting the way we live and work. Its effects will no doubt be long-lasting. In the near-term, it will require CISOs to update and ... Read More