Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras […]
A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 […]
Many industrial IoT systems have open doors that create unintended vulnerabilities. What information could be exposed by open communications protocols? How do […]
Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as […]
Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires […]
The global cybersecurity skills shortage continues to be a critical issue. For example, ESG research found 45% of organizations report a “problematic […]