by Tibor Luter | Jul 28, 2021 | blog
How to demonstrate ROI from your cyber security strategy The best outcome from a well-executed cyber security strategy should be that a business experiences no change or disruption to their operations or systems in the case of an external threat However, while this is...
by Tibor Luter | Jul 27, 2021 | blog
Memory Corruption Issues Lead 2021 CWE Top 25 The MITRE Common Weakness Enumeration (CWE) team’s latest list of most dangerous software flaws includes several that shot up in significance since 2020. Memory corruption errors remain one of the most common and dangerous...
by Tibor Luter | Jul 20, 2021 | blog
Defence in Depth – Time to start thinking outside the box Spam Prevention, Anti-Virus, Intrusion Prevention – these are just a few solutions you may already be using as part of your cyber security strategy Whilst these are all effective in their own right, have you...
by Tibor Luter | Jul 20, 2021 | blog
Vulnerability in Schneider Electric PLCs allows for undetectable remote takeover Dubbed Modipwn, the vulnerability affects a wide variety of Modicon programmable logic controllers used in manufacturing, utilities, automation and other roles. A vulnerability discovered...
by Tibor Luter | Jul 14, 2021 | blog
Watch for Cybersecurity Games at the Tokyo Olympics The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications. It was a close call, but the 2018 Pyeongchang...
Recent Comments