While cloud service providers are responsible for infrastructure security, it is the responsibility of individual companies to ensure data protection for stored information. McAfee outlines…
Securing IoT Part II: Security by Design for Devices
Security by design for IoT devices means envisioning security vulnerabilities at the concept stage of IoT device manufacturing. This allows for the strategic implementation of…
Securing IoT Part I: The Network
Threats to the IoT network are everywhere. To prevent attacks, common IoT security practices, networks and access points must be carefully and regularly evaluated. Why…
Securing the IoT Supply Chain
In November 2020, the European Union Agency for Cybersecurity released guidelines on securing the IoT supply chain. This can be a difficult task as all…
The Zero Trust Approach to Cybersecurity
Cybersecurity threats are everywhere and new government information standards are being implemented to keep data secure. As cybersecurity practices receive updates, companies should reevaluate their…
IoT Security Weaknesses: Networks, Development & Users
There are many threats to IoT security. But among the ugly attacks, there’s good news. How do Hackers Access IoT? Hackers target IoT with malicious…
COVID-19’s Impact on Cybersecurity
The world’s greatest health concern also became its largest cybersecurity threat. As workers moved to remote settings, IT departments became strained, cyberattacks increased and companies…
Cybersecurity Standards & Protocols: NIST 800-171
The latest revision of the National Institute of Standards and Technology’s (NIST) Special Publication 800-171 was fully implemented December 31, 2017. The publication includes standards…
Cybersecurity Standards & Protocols: CMMC
The Cybersecurity Maturity Model Certification (CMMC) is an information technology standard created by the U.S. Department of Defense for the defense industrial base (DIB) –…