Deconstructing the Cyber Kill Chain

Contrary to what the media may want you to believe, a news-making data breach isn’t always a harbinger of doom and gloom. Cyber criminals are upping the frequency and sophistication of their attacks. It’s inevitable that some will slip past your cybersecurity. But keep in mind that all is not lost when a hacker breaches…

Ransomware Tricks to Avoid

9 Ransomware Tricks To Avoid

The ransomware scourge, which broke years ago with the emergence of police locker, is deadlier than ever. Today, it’s the fastest growing malware threat according to the U.S. Department of Justice. Since January 1 of this year, there have been an estimated 4,000 ransomware attacks every day — a 4-time jump from 2015 which saw…

ics security

3 ICS Security Incidents that Rocked 2016 and What We Should Learn from Them

Physical and digital systems are increasingly linked together in modern industrial environments like those seen in the United States. While this connectivity automates the management of industrial control systems (ICS), it also means a digital attack against our nation’s critical infrastructure could negatively affect users’ physical health and safety. In the name of national security…