From the Spring 2023 Issue

Establishing A “Security First” Approach for IoT Devices No Matter the Industry

Author(s):

Thorsten Stremlau, Co-Chair of Trusted Computing Group Marketing Work Group | Systems Principle Architect at Nvidia, Trusted Computing Group

Across the globe, society has become increasingly dependent on digital technologies. By 2030, over 25.4 billion Internet of Things (IoT) devices are expected to play a crucial role in our daily lives. As a result, it is essential that developers adopt a ‘secure by design’ approach to ensure both device protection and integrity throughout any … Read more

From the Spring 2023 Issue

New and Improved ISO/IEC 27002: A Comprehensive Guide to Strengthen Cybersecurity and Data Protection

Author(s):

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

New and Improved ISO/IEC 27002

ISO/IEC 27002:2022 is an essential information security standard that helps organizations protect their data and assets. It provides a comprehensive set of guidelines and best practices to help ensure the Confidentiality, Integrity and Availability (CIA) of sensitive information. It outlines a strong framework for risk assessment and management, as well as robust operational security controls, … Read more

From the Spring 2023 Issue

Best Practices for Critical Infrastructure Security in Transportation

Author(s):

Krishna Chaitanya Tata, Operational Technology Security Leader, IBM

Critical Infrastructure Security in Transportation

Introduction Critical Infrastructure (CI) has become the new battlefield in the complex geopolitics of the current times. Operational Technology (OT) is the new ‘crown jewels’ that rival nation states and rogue actors regularly target. The transportation sector is one such CI sector that continues to be a prime target for malicious cyber-attacks. In November 2022 … Read more

From the Spring 2023 Issue

Staying Cybersecure in 2023: Implementing Blockchain Technology

Author(s):

Joe Darrah, Freelance, Journalist

Stay Cybersecure in 2023

Cyberterrorism is a persistent, unrelenting threat to the security of any organization that utilizes the internet or any networked system today. Consider the attack launched on the United States Colonial Pipeline Company in May 2021 and the subsequent decision to pay the offenders $4 million in a ransom blackmail scheme in order to restore the … Read more

From the Spring 2023 Issue

High-Tech Layoffs and the Cybersecurity Risks that Result: The Need for a Holistic Approach

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

In today’s fast-paced, technology-driven business landscape, high-tech layoffs and cybersecurity risks are two critical challenges that organizations must address. The COVID-19 pandemic has accelerated the shift towards automation and digitalization, leading to widespread job losses in various industries. At the same time, the increase in remote work and online transactions has led to a sharp … Read more

From the Spring 2023 Issue

An Overdue New Approach to a Generations-old Problem

Author(s):

Dan Richings, Senior Vice President, Global Presales and Solutions Engineering, Adaptiva

Endpoint Computing Security

The world is in a constant state of tumultuous change and in many cases uncertainty. This is particularly taxing on people whose job it is to manage the technology we all use to remain productive throughout the chaos. IT departments in enterprise organizations around the world are full of professionals who work much harder than … Read more

From the Spring 2023 Issue

Protecting Assets in the Cloud with Cloud Posture Security Management (CPSM)

Author(s):

Claus Nielsen, Chief Marketing Officer, Holm Security

CPSM

Cloud-based applications and services can quickly optimize operations for businesses across the globe. The downside to this is the unique challenge it brings to cybersecurity. With cloud security breaches becoming increasingly commonplace, any organization looking to secure the critical assets stored with one or more cloud service provider must look to utilize a Cloud Posture … Read more

From the Spring 2023 Issue

Ransomware Prevention by Pen Testing

Author(s):

Paul Kubler, Red Team Lead, CYBRI

Ransomware Prevention by Pen Testing

Ransomware continues to be a major problem for organizations and costs them a significant amount of money and time to remediate. Even if a company has the best external IT security in place, a single email attachment can lead to a breach. More and more organizations are learning from this and testing their environment by … Read more

From the Spring 2023 Issue

Three Ways to Protect Your Business Against Wiper Malware: The Growing Cyber Threat

Author(s):

Ahsan Siddiqui, Director, Product Management, Arcserve

A fast-growing and alarming threat to corporate data is wiper malware. Unlike ransomware, which can encrypt and disable your files until you pay a ransom, wiper malware deletes company data permanently to cause as much destruction as possible. Once it infects your system, it will make your data completely unrecoverable. This type of malware is … Read more

From the Winter 2023 Issue

Shifting from Reactive to Proactive Security is on the Horizon

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Reactive to Proactive Security

Security leaders often mention that their primary goal is to get ahead of threats instead of responding after something terrible has been discovered. Yet, despite that consistent target to move from a reactive to a proactive security posture, the majority of cybersecurity budgets and efforts continue to focus in the opposite direction. Let’s dig into … Read more