Cybersecurity Threats in the Hotel and Hospitality Industry

Cybersecurity Threats in the Hotel and Hospitality Industry

Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and refrigerators, today’s hotels need to protect their guest’s data security just as they do their physical belongings. It is no...
CISA Meets NY Elections Officials to Address Security

CISA Meets NY Elections Officials to Address Security

As we approach the 2020 elections, the U.S. becomes a huge target for digital threats. From election interference to fraud, the need for adequate cybersecurity measures becomes  more prevalent than ever. Challenges facing the upcoming elections seem to put the...
Threat Modeling for Critical Industrial Control Systems

Threat Modeling for Critical Industrial Control Systems

Industrial Control Systems (ICS) involve the devices, systems networks, controls and instrumentation that are involved in industrial process control. Entities that utilize ICS systems include power and electric utilities, telecommunications, oil and gas processing and...
Threat Modeling for 5G Cybersecurity

Threat Modeling for 5G Cybersecurity

5G structures are the next step in the development of mobile networking. We are about to embark on a next generation system level that emboldens mobile communications with trials and ongoing scale sales. The fifth generation wireless system (5G) seeks to give...
Collateral Damage of a Credit Card Data Breach for the Enterprise

Collateral Damage of a Credit Card Data Breach for the Enterprise

A majority of the public discussion on cybersecurity and compromised identities has centered on consideration of a credit card data breach – to the point where the public barely raises an eyebrow over new incidences. While credit card issuers have gained efficiency at...