IoT, devices, cyber trust mark, trade-offs, users, deception devices Cato Networks BYOD tablet Mobile Devices for GDPR Compliance

Refurbished Security Devices: Mistaken Identity or Deception?

Buying refurbished devices is not uncommon. Online marketplaces, such as eBay, offer a platform for customers to purchase second-hand gadgets at a lower price than the original, but at a higher quality than a used device sold by a private individual. And with today’s supply chain issues and semiconductor bottlenecks, ... Read More
Security Boulevard
Biden cybersecurity maritime China

Critical Infrastructure is Missing Something Critical

The Colonial Pipeline attack was yet another reminder that critical infrastructure is in desperate need of stronger security. The attack is one of the most recent victims of cyberattacks on critical infrastructure; the phenomenon is not new, nor is it confined to the U.S. Critical infrastructure is essential to the ... Read More
Security Boulevard