air gap

AI Could Help Resolve IT/OT Integration Security Challenges
Security issues stemming from the integration of information technology (IT) and operational technology (OT), could be addressed through artificial intelligence (AI), although the technology could also be leveraged by malicious actors, according ...
Security Boulevard
Cybersecurity Lessons from the Pandemic: Avoidance
C. Warren Axelrod | | air gap, avoidance, Contingency Planning, COVID-19, General, Pandemic, Risk Analysis, Spotlight, Y2K
There are a number of confusing differences of opinion with respect to handling the COVID-19 pandemic. Some of the confusion seems to center around a common misunderstanding of the roles of various ...

Using SaaS Backup and Recovery to Protect Your Data With a Virtual Air Gap
Organizations find themselves in a quandary these days when it comes to whether they should deploy an air-gap strategy—a strategy in which secondary backup data is saved in an offsite and offline ...
Security Boulevard
To Air-Gap or Not Air-Gap Industrial Control Networks
What is air-gapping, and why do we air-gap networks? What camp are you in? In the camp that believes in air-gaps, or the other set that says they truly do not exist? ...

NFCdrip: Data Exfiltration Research in Near Field Communication
Pedro Umbelino | | air gap, air gapping, air-gapped systems, Blog, data exfiltration, near field communication, NFC, NFC radio, NFC range, NFCdrip, Technical Blog
Near-field communication (NFC) is a set of protocols that enables two electronic devices to establish communication by bringing them very close together. Usually the devices must be within less than 4cm. Contactless ...

Meet NFCdrip – a New Security Concern for Air-Gapped Systems
Haidee LeClair | | air gap, air gapping, air-gapped systems, android, Android's NFC design, Attack Surface, Blog, data exfiltration, Data Leaks, near field communication, NFC, NFC frequency, NFC radio, NFCdrip, RFID, Technical Blog, vulnerable IoT objects
Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one ...
Securing Apps When User Devices Are Compromised
Corporate networks and user PCs continue to be exploited—leaving your sensitive applications and data vulnerable. Network segmentation is a fundamental way to mitigate the risks associated with these vulnerabilities—but it only works ...
Introducing Bromium Protected App®: Protect Critical Applications Against Compromised Devices
Kimberly Becan | | air gap, network segmentation, Product News, Protected App, Virtualization, zero trust
Protected App locks down access to and from your sensitive data, keeping it secure even if networks and host PCs have been compromised Using hardware-enforced virtualization-based security, Bromium Protected App protects against ...

What Your Favorite TV Shows Get Right (and Hilariously Wrong) About Air Gap Technology
Chances are, one of the first places you may have heard about an air gap computer was on TV. Olivia Pope on “Scandal” knows what air gap technology is. Elliot on “Mr ...
Security Boulevard