Cybersecurity vs. Risk Management

Change focus from Threat to Risk

Frank worked in Information Security as a System Administrator.  He had spent most of the day thwarting bad guys and was frustrated.  After five years, he was in the same job as when he started.  Frank felt locked in a cage, working from home day in and day out, fighting off threats to his company’s […]

Read More… from Cybersecurity vs. Risk Management

SCADA System Vulnerability Threatens Global Infrastructure

SCADA Data Leaks

SCADA under attack In April 2020, Israeli National Cyber Directorate alerted water utility companies after hackers took aim at their systems. The attackers targeted supervisory control and data acquisition (SCADA) systems linked to pumping stations, sewage facilities, as well as wastewater treatment plants. This prompt governmental notification urged energy and water organizations to update their […]

Read More… from SCADA System Vulnerability Threatens Global Infrastructure

Digital Signatures are the Cybersecurity Vulnerability You Need to Stop Ignoring

Digital Signatures are the Cyber Security Vulnerability You Need to Stop Ignoring

Enterprises’ employees and third parties exchange an abundance of confidential documents, both internally and externally, and through a variety of means, including email and file-sharing platforms. These employees and third parties are often advised to secure these documents by attaching a digital signature. A digital signature is a trace attached by the author of a […]

Read More… from Digital Signatures are the Cybersecurity Vulnerability You Need to Stop Ignoring