Jun 14, 2022 | IoT Cybersecurity, Threat Modeling
The healthcare industry is teaming up with electronic medical devices. And many of them are connected to the local area network in a medical facility, making them IoT (Internet-of-Things) devices. These IoT medical devices offer many benefits, including the ability to...
May 2, 2022 | Cyber Risk, IoT Cybersecurity, Regulatory Compliance, security controls
When you think of cyber threats, you probably think about phishing attacks targeted at corporate employees or ransomware aimed at financial institutions. You probably don’t think about a hacker attacking a digital thermometer, but you should. The next great wave of...
Mar 18, 2020 | Cloud security, Cyber Risk, Enterprise Threat Modeling, IoT Cybersecurity, Regulatory Compliance, Security
The healthcare sector repeatedly battles a high number of data breaches and other cybersecurity issues. According to the 2019 Ponemon Institute-IBM Security report, healthcare corporations pay an estimate of $6.5 million per breach, which accounts for more than 65...
Mar 12, 2020 | 5G Security, Attack Surface Analysis, Cloud security, IoT Cybersecurity
With the pending dominance Internet of Things (IoT) adoption in business applications, combined with a growing necessity for mobile devices and laptops, the limitations of 4G LTE technology serves as a motivation for mobile network operators to launch enhanced 5G...
Feb 19, 2020 | Cloud security, IoT Cybersecurity, Risk Management, Security
Nowadays, data breaches are a grim reality and a party of the daily grind for organizations – no matter what sector or size. Enterprises are exposed to hackers and malicious insiders daily. As ubiquitous as they are today, threats and vulnerabilities are only...
Feb 6, 2020 | Attack Surface Analysis, IoT Cybersecurity, Risk Management, Security
Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and refrigerators, today’s hotels need to protect their guest’s data security just as they do their physical belongings. It is no...