Syndicated Blog

Armis
Secure the Enterprise of Things with Armis.
Cybersecurity Executive Order – A First Step

Cybersecurity Executive Order – A First Step

|
Cybersecurity Executive Order - A First StepBy John Allison, Federal Product Manager As the Armis Federal Product Manager, I have waited with some anticipation for the new cybersecurity executive order (EO). Last ...
Ireland’s Health System Under Attack

Ireland’s Health System Under Attack

|
Ireland’s Health System Under AttackBy Nadir Izrael, Co-founder and CTO After operations had been halted at manufacturers like Molson Coors and critical infrastructure was shut down on the Colonial Pipeline, it’s now ...
Legislating IoT Devices, One Part of IoT Security Jigsaw

Legislating IoT Devices, One Part of IoT Security Jigsaw

|
Legislating IoT Devices, One Part of IoT Security JigsawBy Andy Norton, European Cyber Risk Officer The UK government recently announced that it is forging ahead with plans to legislate IoT devices and, ...
Top US Oil & Gas Supplier: Colonial Pipeline, Allegedly Hit by Eastern European Ransomware Attack.

Top US Oil & Gas Supplier: Colonial Pipeline, Allegedly Hit by Eastern European Ransomware Attack.

|
Initial reports indicate that European criminal gang DarkSide undertook the attack against Colonial Pipeline, taking 5,500 miles of pipeline off-line and stopping the distribution of 100 million gallons of fuel per day ...
A New Milestone In Protecting Critical Infrastructure

A New Milestone In Protecting Critical Infrastructure

|
A New Milestone In Protecting Critical InfrastructureBy Curtis Simpson, CISO This year’s winter in Texas reminded me of a movie I hadn’t seen in years; 1996’s “The Trigger Effect”.  The movie paints ...

From URGENT/11 to Frag/44: Analysis of Critical Vulnerabilities in the Windows TCP/IP Stack

|
From URGENT/11 to Frag/44: Analysis of Critical Vulnerabilities in the Windows TCP/IP StackBy Ben Seri, Yuval Sarel, Gal Levy, and Noam Afuta  Part 2: The Armis research team finds a new primitive ...
Armis and Eseye Connect and Protect Any Thing, Anywhere

Armis and Eseye Connect and Protect Any Thing, Anywhere

|
Armis and global connectivity specialist Eseye announced a strategic partnership and joint solution that enables organizations to deploy connected devices anywhere in the world with enterprise-class security and consistent, reliable cellular (4G/LTE/5G) ...
Armis for Healthcare: Pivoting the Approach to Vulnerability Management

Armis for Healthcare: Pivoting the Approach to Vulnerability Management

|
Inoculating medical devices against vulnerabilities can be done. Learn what it takes to avoid the pitfalls of traditional approaches and innovate new practices to have a clinical risk based approach that helps ...
Some cheeses have holes, but your cyber security strategy should not.

Some cheeses have holes, but your cyber security strategy should not.

|
Last week we highlighted the fact that breweries have been classified as ‘essential’ in some regions – causing major concern when North America's largest beer maker suddenly ceased production due to a ...
A Storm Might be Brewing at Molson Coors

A Storm Might be Brewing at Molson Coors

|
In some countries, breweries have been classified as 'essential' during the pandemic. So when North America's largest beer maker suddenly ceased production in March due to a cyber-attack it sent shockwaves through ...

Secure Guardrails