Answering your burning IIoT questions with Cyril Perducat, EVP of IoT & Digital Offers, Schneider Electric
As any manufacturing company embarking on a digital transformation journey, you want to be more productive and more energy-efficient all while managing the unknowns such as unpredictable market conditions, geopolitical/trade…
The Common Vulnerability That Fintech and Bananas Share
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory…
What the Industry’s First Coleopteran Chief Vulnerability Officer Predicts for 2019
Lets not beat around the bug 2018 was not a good year for my kind. As of now, nearly슠one in three computers was hit with a malware attack this year,…
All Endpoints Are Not Created Equal, But They All Need Protection
What you are about to read could be straight out of a horror movie. You would hear the eerie voiceover intoning”In a world where endpoints are under constant attack, how…
The CANOPY WING Vulnerability: Weaponizing the Weakness
Finding a vulnerability, developing an exploit, and then launching (or not launching) this exploit is repeated many times every day. Now more than ever companies must be aware of two…
Are We Doomed to Repeat the Past When it Come to Hacking?
On an almost weekly basis, another organization or government agency owns up to having been hacked admitting that its systems have been breached. For every company that discloses an issue,…
Commercial Availability of Self-Service Cyberhardening Technology
RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems, devices and industrial control systems (ICS), has announced the commercial availability of슠Alkemist, a proprietary self-service technology built…
Simon Hartley, Strategic Accounts
Mr. Hartley works with government customers at CIS Mobile with its altOS mobile security platform.슠 He also worked with Apple and Samsung in hardening their mobile devices for U.S. government…
Binary randomization makes large-scale vulnerability exploitation nearly impossible
One of the main reasons cyber risk continues to increase exponentially is due to the rapid expansion of attack surfaces the places where software programs are vulnerable to attack or…
The Antidote to Industrial IoT’s Kryptonite
Todays industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, theyve automated and digitized their machines to achieve unprecedented power. But these super…
Joe Saunders, Founder and CEO
Joe Saunders has more than 25 years of leadership, business building, and startup experience having served in a variety of business development and general management roles for high growth companies.…