Addressing the Log4j Vulnerability

The Log4j exploit is the latest major cybersecurity breach taking over the headlines. However, there is a lot of confusion surrounding this issue, and this exploit is far different and much more complex than most others. In this blog, our goal is to inform about the Apache log4j vulnerability and what everyone really needs to […]

Sector-Specific Cybersecurity for Critical Infrastructure

As cyberattacks mature in scale and damage, protecting critical infrastructure grows more in importance every single day. Specifics are key in building a cybersecurity strategy, and different sectors must mitigate different risks. In today’s blog, we’ll discuss best practices for different critical infrastructure sectors. Critical infrastructure at a Glance Critical infrastructure is defined as the […]

Cybersecurity & SCADA Systems – Why It Matters

SCADA Systems Illustration

SCADA systems are the heart of most modern industrial facilities. We’re going to discuss what SCADA is and why cybersecurity for this important system matters. WHAT EXACTLY IS SCADA? SCADA systems are the supervisory-level control point over machinery and processes across the entire facility. It is a subset of ICS that combines hardware and software […]

5 Common Cybersecurity Threats You Should Be Aware Of

Common Cyber Threats

In today’s digital world, there are countless cybersecurity threats hiding in plain sight. Many of them are more common than you may think. This blog will discuss a few of these trending threats and our recommended prevention methods. 1. Ransomware Ransomware is a form of malware that blocks a company’s access to its devices and […]

OT/IT Convergence: Combining systems for business growth

IT OT Convergence

With industry 4.0 in full swing, OT and IT are rapidly becoming one and the same. OT/IT convergence is driving a major digital transformation within this growing industry. What is OT/IT Convergence? Operational technology (OT) and Information technology (IT) are often used synonymously, but the two play different key roles within any industrial organization. IT […]

Colonial Pipeline Hack: What We Know So Far

Colonial Pipeline Hack: What We Know So Far

Colonial Pipeline Hack: A Ransomware Attack On May 7th, Colonial Pipeline announced that it has been the victim of a serious cyberattack. The issue forced the company to shut down its entire network, leading to major disruptions in its operations. By attempting to isolate and contain the threat, Colonial Pipeline was also forced to put […]

Ransomware attack halts Sierra Wireless Production Activities

Ransomware Attack Halts Sierra Wireless Production Activities One of the leading solutions providers of internet-of-things (IoT), Sierra Wireless, experienced a ransomware attack some weeks ago that halted its production activity, also freezing other internal operations. Routers, gateways, modules, smart connectivity solutions for IoT devices and cellular modems are some of the communication equipment made by […]

Stakeholders’ Personal Records Leaked in Recent Shell/Accellion Breach

Stakeholders’ Personal Records Leaked in Recent Shell/Accellion Breach

Shell, the multinational oil giant, disclosed in late March that the personal information of some of its stakeholders and business data from linked organizations have been compromised after a successful attack on its network.  It was disclosed by the company that a still-unknown malicious agent breached into the system, accessing files containing sensitive data belonging […]

Reactions to U.S. Water Plant Hack

In the second week of February 2021, the U.S. government revealed that unknown hackers had gained remote access to systems at a water plant in Florida City. The hackers attempted to raise the levels of certain chemicals to an extent where members of the public would run the risk of being poisoned. The water supply […]