The February 2021 remote cyber attack to the water treatment system for the city of Oldsmar FL, could have put put 15,000 residents at risk. The fact that the attacker was able to get that far shows just how vulnerable America’s critical infrastructure and government environments are to remote cyberattacks.

Infrastructure Intrusion: America Under Attack

Guest OpEd by Chris Risley, CEO at Bastille Networks It could have been worse. Much, much worse. On February 5th, 2021, the city of Oldsmar, Florida was targeted for a cyberattack. The intruder remotely...
In computing, a denial-of-service attack (commonly known as a DDOS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

What Does the Future of DDoS Attacks Look Like?

Guest OpEd by MJ Shoer, SVP, Executive Director at CompTIA ISAO A DDoS attack is a malicious attempt to sabotage someone's online business. It occurs when a botnet, which is a network of...
Ready to make the jump to passwordless authentication? Enjoy complete and robust passwordless authentication for your entire workforce and eliminate the possibility of phished or stolen passwords with TruU. Integrate into major enterprise identity stores and IT infrastructure and ensure compatibility with your environment.

TruU Named Newest Competitor in the 2021 ‘ASTORS’ Awards Program

Still Using Passwords? TruU can do better 80% of breaches start with compromised credentials $2.1 Trillion Global cost of data breaches in FY 2019 -5% Drop in stock price the day a...
Security is everyone’s responsibility. When individuals are aware of cyber threats and their possible personal impacts, they change their behavior.

Security Culture – Beyond Technical Controls, by Red Hat’s Andrea Hall

Guest Editorial by Andrea Hall, Red Hat Trespassing. Breaking and entering. Grand larceny. These could be considered physical equivalents of cyber attacks and data breaches. When individuals and organizations endure such attacks, they typically...
Learn about New Technologies organizations are adopting to Prepare for New Security Threats in a Post-COVID world, and How to Deal with the Security Skills Shortage. (Courtesy of Pete Linforth from Pixabay)

Cutting Edge Security Tech in 2021: XDR, Zero Trust, IAST & More

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO The Evolution of Cybersecurity in a Post-COVID World Almost every industry and business process was impacted by the COVID-19 pandemic, and...

Protecting Our & Your Health Data: 3 Pillars of COVID-19 Era Data Security

Guest OpEd by Scott Pettigrew, Chief Security Officer at HMS The year 2020 was one of unprecedented change and uncertainty. Much of the world’s economy — including, notably, the healthcare sector — has...
Mobile team communications apps are fast becoming the go-to solution across the spectrum, from small business to major enterprises, and spanning every industry, whether working in a shared workplace or remotely.(Courtesy of Chris Montgomery on Unsplash)

Redefining Communications for Today’s Mobile Workforces

Guest OpEd by Chief Technologist Dave George Communicating with personnel was already a challenge for companies with workers in the field, widespread workforces in siloed divisions and office locations, or deskless staff who...
Richard Simone, CEO of Cherry Americas Experienced Sales and Merchandizing Executive Richard Simone joins CHERRY Americas as CEO, Focuses on Next Stage of Growth for Global Manufacturer of Computer Input Devices and Technologies

Richard Simone Named CEO of 2020 ‘ASTORS’ Award Winner CHERRY

CHERRY, a leading global manufacturer of computer input devices and switches for mechanical keyboards, and a Recognized Platinum Award Winner in the 2020 'ASTORS' Homeland Security Awards Program, has announced the...
Sophisticated hackers that targeted the water treatment plant during the Super Ball last weekend, reportedly monitored the facility remotely, using an old version of Microsoft Windows and a password to access an disused version of the plant's remote management software. (Courtesy of Manuel Darío Fuentes Hernández from Pixabay)

Why Water Plants are So Vulnerable to Hackers

February 10, 2021 – In Breaking News – Fortune A hacker’s botched attempt to poison the water supply of a small Florida city is raising alarms about just how vulnerable the nation's...
Security begins at the input device – stay protected from keyloggers and BadUSB attacks with the SECURE BOARD 1.0 from CHERRY. With the new CHERRY SECURE BOARD 1.0, accessing sensitive credentials and passwords will be impossible for hardware keyloggers, as keys are entered in encrypted form.

CHERRY on the Future of Work & Society – Gazing into the Crystal Ball

CHERRY, a world-leading manufacturer of computer input devices and switches, and the 2020 Platinum 'ASTORS' Award Winner for Best Smart Card/Reader Systems, is already thinking about tomorrow today. Traditionally, the new year is...