In the News

NIST seeks information on updating its Cybersecurity Framework

Date Published: February, 27, 2022

As it begins planning to revise its widely praised Cybersecurity Framework (CSF), the National Institute of Standards and Technology (NIST) has requested that interested parties supply comments on how NIST can improve the effectiveness of the CSF and its … READ MORE

Tackling supply chain security head-on

Date Published: February, 17, 2022

Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or protect against them. Supply chain threats are a risk on a global scale and are n… READ MORE

Data-at-rest security is essential for the successful operation of businesses worldwide

Date Published: February, 09, 2022

More internet traffic is predicted to be created in 2022 than in the previous 32 years combined. Our digital societies rely on the security of data stored in data centers more than ever before. As a result, it is becoming increasingly important for ther… READ MORE

Taking Industrial Cybersecurity Seriously

Date Published: February, 04, 2022

On page 15 of World Pipelines magazine, Steve Hanna, Co-Chair of the industrial Work Group at TCG, describes how to protect the digital future of pipeline operations.… READ MORE

How to Reduce The Risk of Cyber-Attacks on Global Supply Chains

Date Published: January, 19, 2022

Trusted-Computing-Group-article-USCM-winter-2022-Issue The number of cyber-attacks attempting to compromise global industry supply chains are on the rise, and a new survey by BlueVoyant found that 97 percent of global firms have been impacted by a cybe… READ MORE

The Cyber Skills Shortage & Training Gap – What Is The Solution?

Date Published: January, 12, 2022

With large-scale data breaches increasing in not only frequency but also complexity, increasing cyber security resiliency should be a top priority for all industries. According to the International System Security Certification Consortium (ICS2) the… READ MORE

Protecting Supply Chains from Highly Contagious Attacks

Date Published: January, 11, 2022

Hackers are using supply chain attacks to infiltrate a large number of organizations using a single, targeted attack. According to a report from the security company, Anchore, 64% of respondents have been impacted by supply chain attacks in the last 12 m… READ MORE

Securing Supply Chains Against the Threat of Attacks

Date Published: January, 07, 2022

It is clear to see that supply chain attacks are on the rise. Recent research shows that the US saw a rise of 42% in the first quarter of 2021 alone, and supply chain attacks could increase by four-fold in the remainder of the year. The changing natur… READ MORE

How to Enable DICE and TPM for Optimal Security

Date Published: January, 05, 2022

By 2030, more than 24 billion Internet of Things (IoT) devices will have entered our cities, workplaces and homes, according to Transforma Insights. For years, I have been working to make sure that these devices have a healthy immune system so that they c… READ MORE

Keeping Military Satellite Communications Secure

Date Published: December, 10, 2021

With the threat of cyberattack increasing at astonishing rates in recent years, priorities must shift to protect on of the military's most critical assets. Satellites have become more vulnerable as Earth station access points have rapidly grown, rendering… READ MORE