Search
Close this search box.

Education

A good cybersecurity program is focused on threat detection, incident response and vulnerability management. Courtesy: Chris Vavra, CFE Media and Technology

Smart manufacturing needs smart security, communication

Cybersecurity attacks against manufacturing have increased in the last several years and will continue to do. While a majority have a financial motive rather than corporate espionage, the result is the same: It costs a […]

Courtesy: Bundy Group

Cybersecurity mergers and acquisitions and capital markets update

While the mergers and acquisitions (M&A) and capital raise markets have a wary eye on numerous potential macroeconomic headwinds — the Ukrainian war, inflation, the great resignation — the cybersecurity market continues to demonstrate its […]

Courtesy: Brett Sayles

Technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security […]

Courtesy of: Louisiana State University

Taking a ‘hands-on’ approach to smartphone identity verification

As smartphones have grown more sophisticated over the years, so have their accompanying security measures for identity verification. Simple passwords have been replaced by thumbprints and facial recognition. However, those methods do not solve the […]

2022’s top manufacturing cybersecurity risks

2022’s top manufacturing cybersecurity risks

Cyber incidents have become a major problem for large corporations, small businesses and individuals alike. No one is immune from a potential attack, which means everyone in an organization must play a role in safeguarding […]

Introduction to ICS security fundamentals

Introduction to ICS security fundamentals

It’s critical to understand what industrial control systems (ICS) are, why they are vital and outline the unique challenges of securing ICS. What are industrial control systems? Industrial control systems are used for managing, directing, […]

Three ways to engage your workforce in 2022

Three ways to engage your workforce in 2022

One of the biggest challenges we consistently hear from security awareness professionals is how to effectively engage, train, and secure a remote workforce. Many of us thought remote working would end in 2021, that life […]

A good cybersecurity program is focused on threat detection, incident response and vulnerability management. Courtesy: Chris Vavra, CFE Media and Technology

Smart manufacturing needs smart security, communication

Cybersecurity attacks against manufacturing have increased in the last several years and will continue to do. While a majority have a financial motive rather than corporate espionage, the result is the same: It costs a […]

Courtesy: Bundy Group

Cybersecurity mergers and acquisitions and capital markets update

While the mergers and acquisitions (M&A) and capital raise markets have a wary eye on numerous potential macroeconomic headwinds — the Ukrainian war, inflation, the great resignation — the cybersecurity market continues to demonstrate its […]

Courtesy: Brett Sayles

Technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security […]

Courtesy of: Louisiana State University

Taking a ‘hands-on’ approach to smartphone identity verification

As smartphones have grown more sophisticated over the years, so have their accompanying security measures for identity verification. Simple passwords have been replaced by thumbprints and facial recognition. However, those methods do not solve the […]

2022’s top manufacturing cybersecurity risks

2022’s top manufacturing cybersecurity risks

Cyber incidents have become a major problem for large corporations, small businesses and individuals alike. No one is immune from a potential attack, which means everyone in an organization must play a role in safeguarding […]

Introduction to ICS security fundamentals

Introduction to ICS security fundamentals

It’s critical to understand what industrial control systems (ICS) are, why they are vital and outline the unique challenges of securing ICS. What are industrial control systems? Industrial control systems are used for managing, directing, […]

Three ways to engage your workforce in 2022

Three ways to engage your workforce in 2022

One of the biggest challenges we consistently hear from security awareness professionals is how to effectively engage, train, and secure a remote workforce. Many of us thought remote working would end in 2021, that life […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES