Unsafelok Threat Highlights It’s About Both IoT Devices and Applications

IoT devices and applications exist all over the place, and in high volume.  Today’s news brought yet another example of how the scale of IoT systems leads to the conclusion that their ...

Survey on 2024 IoT Security Crisis

Surveys play an important role in setting strategy and choosing how to address a difficult situation.  Organizations today are urgently in need of addressing their IoT security situation; it’s the fastest growing ...

The Coming End of Biometrics Hastens AI-Driven Security

Until recently I thought we had a lot of time ahead of us to be secure in using biometrics to authenticate who I am and what I should have access to.  But ...

The Connection Between Alaska Airlines, Blown Out Windows, and IoT Security

| | Blog, firmware, iot, remediation
As the shock starts to wear off from hearing that a window blew out on a recent Alaska Airlines flight I came across research from our partner Nozomi Networks that might help ...
Cybersecurity Insights with Contrast CISO David Lindner | 11/17

Cybersecurity Insights with Contrast CISO David Lindner | 11/17

Insight #1 Organizations are continuing to pay more for top cybersecurity talent, and with the Securities and Exchange’s (SEC’s) most recent lawsuit against SolarWinds and its former Chief Information Security Officer, those ...
Cybersecurity Insights with Contrast CISO David Lindner | 11/10

Cybersecurity Insights with Contrast CISO David Lindner | 11/10

Insight #1 The U.S. has launched the Shields Ready campaign: a campaign “about making resilience during incidents a reality by taking action before incidents occur.” I love this focus on critical national ...
process automation Palo Alto Networks developer security AI felony mdr cybersecurity

How Process Automation Can Help Streamline Security

Process automation is one of the most effective strategies businesses can use to enforce a security-centric culture ...
Security Boulevard
Apple research study, data breaches, immutable storage, backup storage, ransomware data backup

Radiant Security Emerges to Apply AI to Cybersecurity

Radiant Security's co-pilot tool uses ML algorithms and other data science techniques to make it simpler to detect and thwart cyberattacks ...
Security Boulevard
Learn about the StackRot vulnerability

What You Need to Know About StackRot – CVE-2023-3269

StackRot, identified as CVE-2023-3269 is a 7.8 HIGH use-after-free vulnerability in the Linux kernel versions 6.1 to 6.4 that can lead to privilege escalation. The vulnerability, which was disclosed by Ruihan Li ...
A person failing a live phishing test and being frustrated

An employee clicked on a phishing link: 5 steps to take to protect your business

The post An employee clicked on a phishing link: 5 steps to take to protect your business appeared first on Click Armor ...

Secure Guardrails