(844) 773-7734 [email protected]
We Infiltrated a Counterfeit Check Ring! Now What?

We Infiltrated a Counterfeit Check Ring! Now What?

Imagine waking up each morning knowing the identities of thousands of people who are about to be mugged for thousands of dollars each. You know exactly when and where each of those muggings will take place, and you’ve shared this information in advance with the...
A Conversation on Zero Trust for the Modern World

A Conversation on Zero Trust for the Modern World

Insights from Cisco VP/GM of Zero Trust and Duo, Ash Devata  I recently had a conversation with Cisco’s VP/GM of Zero Trust and Duo, Ash Devata, who knows more than a thing or two about zero trust. Ash joined Cisco in 2018 via Cisco’s acquisition of Duo Security. Duo...
A Conversation on Zero Trust for the Modern World

Extending Zero Trust Security to Industrial Networks

Recent cyber attacks on industrial organizations and critical infrastructures have made it clear: operational and IT networks are inseparably linked. With digitization, data needs to seamlessly flow between enterprise IT and industrial OT networks for the business to...
MyBook Users Urged to Unplug Devices from Internet

MyBook Users Urged to Unplug Devices from Internet

Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a previously unknown critical flaw that can be triggered by...