Dozens of hospitals have been admonished to immediately patch weaknesses in their VPN infrastructure after finding evidence a ransomware crew was probing for weaknesses to exploit.
With the release of the Cybersecurity Maturity Model Certification, the time for systems integrators and other contractors to evade compliance with cybersecurity mandates has finally run out.
Defendify Co-Founder Rob Simopoulos discusses the cyber landscape and informs integrators about opportunities in this burgeoning field.
According to Beazley, the two most common forms of attack to deploy ransomware are phishing emails and breaching poorly secured remote desktop protocol (RDP).
Answer these important questions when evaluating your portfolio and growth plans for the future of your business to ensure long-term success.
Athena Security’s AI utilizes thermal cameras to screen for people with an elevated body temperature, one of the first signs of coronavirus infection.
Digital transformation is about business model change, not product evolution cycles. Here’s why you should adopt a managed security service provider program.
The report also found that a vast majority of IoT devices are unencrypted, potentially exposing personal and confidential data.
PSA’s MSSP program helps integrators diversify their service offerings and realize the full potential and benefits of a managed services business model.
Malicious cyber actors could take advantage of public concern surrounding COVID-19 by conducting phishing attacks and disinformation campaigns.