Home > Support > Blog
Ransomware and the Vanishing Security of Anonymity

Ransomware and the Vanishing Security of Anonymity

There used to be a common belief, among cybersecurity professionals and business users alike, that you had to have something of value on your network for hackers to come after you. This is true to some extent, although many people think of value as money and only worry about financial data. Some also recognize the value of intellectual property, and there’s increasing awareness of the black-market value of personally identifiable information.

Thursday, November 09, 2017/Author: David Wynne, Cybersecurity Engineer/Number of views (122)/Comments (0)/
Categories: Security Services
The WPA2 Security Flaw: What You Should Know

The WPA2 Security Flaw: What You Should Know

A security researcher has reported a serious vulnerability in the Wi-Fi Protected Access II (WPA2) security protocol that could allow hackers within range of a wireless network to intercept data, or even inject malicious content or malware in certain cases. The flaw was discovered by Mathy Vanhoef of the Imec-DistriNet Research Group of Belgian university KU Leuven. Vanhoef executed a successful attack as a proof of concept.

Tuesday, October 31, 2017/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (138)/Comments (0)/
Categories: Security Services
NIST Drafts an Update to Its Cybersecurity Framework

NIST Drafts an Update to Its Cybersecurity Framework

The term “perfect storm” refers to a confluence of events that makes a bad situation dramatically worse. It succinctly sums up the cybersecurity challenges organizations are facing today.

Tuesday, June 27, 2017/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (399)/Comments (0)/
Categories: Security Services
Cybercriminals Have Set Their Sights on the Energy Sector

Cybercriminals Have Set Their Sights on the Energy Sector

The Associated Press recently reported that oil and gas companies, including some of the largest in the industry that operate along the Gulf Coast near Houston, have become a popular target for hackers. Many companies are using decades-old technology and unprotected wireless signals to connect computer networks to equipment, leaving refineries, pipelines, and chemical plants vulnerable to attack. In fact, the Houston Chronicle reported 350 security incidents and uncovered nearly 900 security flaws at energy companies between 2011 and 2015.

Tuesday, March 28, 2017/Author: The SageNet Team/Number of views (556)/Comments (0)/
Categories: Security Services
NIST and DHS Release Guidelines for IoT Security

NIST and DHS Release Guidelines for IoT Security

Security threats are forming an increasingly dark cloud over the Internet of Things (IoT). While the IoT continues to create competitive opportunities in a wide range of industry sectors, the vulnerabilities inherent in billions of connected devices offer a platform for hackers to steal data and disrupt critical systems and infrastructure. The risk is so great that two federal agencies have issued new guidelines for bolstering IoT security.

Thursday, December 01, 2016/Author: The SageNet Team/Number of views (1016)/Comments (0)/
Categories: Security Services
RSS
paykasa bozum
istanbul evden eve nakliyat
porno izle
full porn movies
instagram begeni
mobilepornxtube mobile18porn mobilefuckporn mobilexxxsexporn xnxxpornvideos.xyz/a> freexnxxporn.xyz
sex izle
kusadasi escort
beylikduzu escort escort istanbul escort porno izle sex hikayeleri
kusadasi escort
free porn videos