remediation
Unsafelok Threat Highlights It’s About Both IoT Devices and Applications
IoT devices and applications exist all over the place, and in high volume. Today’s news brought yet another example of how the scale of IoT systems leads to the conclusion that their ...
Survey on 2024 IoT Security Crisis
Surveys play an important role in setting strategy and choosing how to address a difficult situation. Organizations today are urgently in need of addressing their IoT security situation; it’s the fastest growing ...
The Coming End of Biometrics Hastens AI-Driven Security
Until recently I thought we had a lot of time ahead of us to be secure in using biometrics to authenticate who I am and what I should have access to. But ...
The Connection Between Alaska Airlines, Blown Out Windows, and IoT Security
As the shock starts to wear off from hearing that a window blew out on a recent Alaska Airlines flight I came across research from our partner Nozomi Networks that might help ...
Cybersecurity Insights with Contrast CISO David Lindner | 11/17
Insight #1 Organizations are continuing to pay more for top cybersecurity talent, and with the Securities and Exchange’s (SEC’s) most recent lawsuit against SolarWinds and its former Chief Information Security Officer, those ...
Cybersecurity Insights with Contrast CISO David Lindner | 11/10
Insight #1 The U.S. has launched the Shields Ready campaign: a campaign “about making resilience during incidents a reality by taking action before incidents occur.” I love this focus on critical national ...
How Process Automation Can Help Streamline Security
Process automation is one of the most effective strategies businesses can use to enforce a security-centric culture ...
Radiant Security Emerges to Apply AI to Cybersecurity
Radiant Security's co-pilot tool uses ML algorithms and other data science techniques to make it simpler to detect and thwart cyberattacks ...
What You Need to Know About StackRot – CVE-2023-3269
StackRot, identified as CVE-2023-3269 is a 7.8 HIGH use-after-free vulnerability in the Linux kernel versions 6.1 to 6.4 that can lead to privilege escalation. The vulnerability, which was disclosed by Ruihan Li ...
An employee clicked on a phishing link: 5 steps to take to protect your business
The post An employee clicked on a phishing link: 5 steps to take to protect your business appeared first on Click Armor ...