Vulnerability scanners are automated tools that allow organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks. Vulnerability scanning is a common practice across enterprise networks and is often mandated by industry standards and government regulations to improve the organization’s security posture. There are many tools and…

How 5G could impact cybersecurity strategy

With the recent news that South Korea has rolled out the world’s first 5G network, it’s clear that we’re on the precipice of the wireless technology’s widespread launch. Offering speeds anywhere from 20 to 100 times faster than 4G long-term evolution (LTE), the next generation of wireless networks will also support higher capacities of wireless…

Cloud-Delivered Network Security No Longer Optional

The adoption of the public cloud is driving a fundamental change in the way organizations connect remote users and distributed sites to their networks and applications. But as we’ve seen during other great times of change, tech transitions are tricky and always raise new security concerns. These are the security concerns of the Cloud Generation….

ADC Attacks Can Cause Damage in Industrial Environments

Malicious actors could cause physical damage by exploiting flaws in how analog-to-digital converters (ADCs) are used in industrial environments, researchers warned. ADCs are electronic devices that convert analog signals, such as voltage or amperage, into digital signals. In industrial environments, ADCs can be used to produce a digital number from an analog signal coming from…

Smart city initiatives: Highly integrated and complex problems to solve

Every day, leaders of large cities grapple with knotty, complex problems like decaying public transportation infrastructures, aging utility lines, urban blight, neighborhoods that are vulnerable to the effects of climate change, and other multi-faceted socio-economic challenges. Increasingly, municipal leaders are turning to urban analytics, data collection, and advances in sensor technology to help solve the…

7 Imminent IoT Threats

Recent distributed denial-of-service (DDoS) attacks involving the use of thousands of compromised digital video recorders and IP cameras have highlighted the looming security threat posed by the Internet of Things (IoT). Analyst firm Juniper Research estimates that between now and the end of 2020, the number of “things” connected to the Internet will grow from…

Why Poor Cyber Hygiene Invites Risk

Organizations around the world are implementing mobility, cloud computing, the Internet of Things (IoT), business intelligence, and social media technologies at breakneck speeds in order to remain competitive and relevant in today’s digital economy. However, with the rapid implementation of these technologies, new weak spots are emerging for attackers to exploit. And those adversaries are…