Feb 6, 2020 | Attack Surface Analysis, IoT Cybersecurity, Risk Management, Security
Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and refrigerators, today’s hotels need to protect their guest’s data security just as they do their physical belongings. It is no...
Jan 29, 2020 | Recent News, Regulatory Compliance, Risk Management, Security, Threat Models
As we approach the 2020 elections, the U.S. becomes a huge target for digital threats. From election interference to fraud, the need for adequate cybersecurity measures becomes more prevalent than ever. Challenges facing the upcoming elections seem to put the...
Jan 15, 2020 | Comprehensive Attack, Cyber Risk, Industrial Control System, IoT Cybersecurity, Risk Management, Threat Modeling
Industrial Control Systems (ICS) involve the devices, systems networks, controls and instrumentation that are involved in industrial process control. Entities that utilize ICS systems include power and electric utilities, telecommunications, oil and gas processing and...
Dec 24, 2019 | Cyber Risk, Risk Management, Security
5G structures are the next step in the development of mobile networking. We are about to embark on a next generation system level that emboldens mobile communications with trials and ongoing scale sales. The fifth generation wireless system (5G) seeks to give...
Dec 11, 2019 | DevSecOps, Risk Management, Security
A majority of the public discussion on cybersecurity and compromised identities has centered on consideration of a credit card data breach – to the point where the public barely raises an eyebrow over new incidences. While credit card issuers have gained efficiency at...
Oct 23, 2019 | Attack Surface Analysis, Cloud security, DevSecOps, Enterprise Threat Modeling, Risk Management, Security
Information security objectives are defined goals and targets that aim to protect an organization’s data from unauthorized access, use, disclosure, disruption, modification, or destruction, thus ensuring its confidentiality, integrity, and availability. They...