IoT Security is Living on the Edge

As the size of the Internet of Things (IoT) continues to grow, so too do the potential security risks for […]

Full Details

Protecting Critical Infrastructure from Cyber Threats

In recent years, there has been a fundamental change in both the scope and scale of cyber threats to critical […]

Full Details

Reducing Wildfires with IoT, ML, and Drones

The wildfire that ripped through California in early October caused tremendous damage and the loss of over 30 lives.  So […]

Full Details

Phishing emails behind notorious ransomware scams revealed

Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is […]

Full Details

Ransomware developers learn from the mistakes of WannaCry and NotPetya

The WannaCry ransomware attack earlier this year infected more than 230,000 computers in 150 countries within one day of its release. It […]

Full Details

NIST SP800-171 and the upcoming DFARS deadline for DOD contractors

Defense Federal Acquisition Regulation Supplement (DFARS) clause 225.204-7012 was established in 2015 to protect Controlled Unclassified Information (CUI).  CUI is […]

Full Details

The evolution of a cybercrime: A timeline of ransomware advances

Ransomware, the malicious code that holds data hostage, is now a more common threat to businesses than data breaches. It […]

Full Details