Enabling the Industrial Internet of Things with Unidirectional CloudConnect

Waterfall Security Solutions launched Unidirectional CloudConnect, a solution based on its patented Unidirectional Gateway technology, designed to meet the challenges of both cybersecurity and interoperability. “Waterfall’s Unidirectional CloudConnect is an essential enabler for the Industrial Internet of Things. CloudConnect secures industrial sites from cyberattacks from the cloud and the Internet, while delivering seamless interoperability of…

From Chasing Alerts to Hunting Threats: What Makes an Effective SOC is Evolving

Whether you call it a SOC, a CSOC, a Cyber Defense Center, or something else, security operation centers have the same fundamental mission – to help organizations detect, analyze, respond to, report on, and prevent cyber security incidents. But what it takes to do that effectively has changed in this ever-evolving threat landscape, putting an…

Why Poor Cyber Hygiene Invites Risk

Organizations around the world are implementing mobility, cloud computing, the Internet of Things (IoT), business intelligence, and social media technologies at breakneck speeds in order to remain competitive and relevant in today’s digital economy. However, with the rapid implementation of these technologies, new weak spots are emerging for attackers to exploit. And those adversaries are…

Cybersecurity Industry Outlook: 2017 to 2021

In 2004, the global cybersecurity market was worth $3.5 billion — and by 2017 it will be worth at least 35X that amount, according to numerous estimates from market researchers and analysts. Cybersecurity is one of the fastest growing and largest technology sectors. Four predictions from Cybersecurity Ventures frame the cybersecurity economy over the next…

Why you need to develop an immersive security strategy

Security solutions today are inadequate in part because they do not provide a truly effective experience for consuming security data and analyzing and responding to threats. In this evolving threat landscape, businesses will need to utilize intuitiveness and situational awareness to enable security professionals to really “experience” the data and become more efficient and strategic….

Backdoor Uploaded to WordPress Sites via eCommerce Plugin Zero-Day

A zero-day vulnerability in an ecommerce plugin for WordPress has been exploited by cybercriminals to upload backdoors to affected websites, researchers warned. The ideal scenario for profit-driven hackers is to find and exploit security holes in plugins installed on hundreds of thousands or millions of websites. However, targeting a large number of less popular applications…

Internet Routing Security Effort Gains Momentum

More than 40 network operators agree to filter routing information, prevent IP address-spoofing, and to work together to thwart Internet traffic abuse and problems. Cyber-criminals and nation-state hackers routinely hide behind phony IP addresses to mask their location and identity, but an Internet initiative that seeks to thwart that and other malicious and inadvertent traffic…

Chris Morgan to Speak at Cyber Maryland Conference October 20-21, 2016

IKANOW’s Chris Morgan was invited to speak on the Cyber Defense Toolbox panel. Each panelist will have 5-8 minutes to present on a product, followed by Q&A. We understand that at last year’s conference, this was one of the more popular sessions. Session abstract: The recent onslaught of cyber-attacks has left many organizations re-evaluating what’s in their toolbox to help…