How to Protect Deployed Assets from Log4j

How to Protect Deployed Assets from Log4j

What Is the Log4j Exploit Nearly every week the cybersecurity community buzzes around a newly discovered vulnerability or a breach. December’s alert for the CVE-2021-4428  vulnerability in Apache Foundation’s Log4j software is no different. Also known…

Cybersecurity Trends to Prepare for in 2022

Cybersecurity Trends to Prepare for in 2022

Recap of Cybersecurity and Cyber Attacks in 2021 Dare I say that the past year has been…drumroll…unprecedented…in the realm of cybersecurity and cyber attacks?  Here are some statistics to showcase what the industry has endured over…

When Industrial Protocol Translation Goes Wrong

When Industrial Protocol Translation Goes Wrong

A recent research paper delves into the vital role of protocol translation in industrial facilities by looking at the protocol gateway. It is a small device that translates the different protocols used by machinery, sensors, actuators,…

Protect Your Organization Against Ransomware Attacks

Protect Your Organization Against Ransomware Attacks

The following best practices can help focus strategies to protect against this growing threat: Know Your Risks and Plan Accordingly: There are several ransomware attack strategies that organizations need to prepare. Web-based attacks that target and compromise…