Implementing reliable security across increasingly complex company networks has become a daunting task for IT teams in the manufacturing sector. Malicious hackers are constantly coming up with newer and nastier ways to infiltrate even the smartest industrial technologies. According to recent research from IBM, destructive cyberattacks capable of rendering victim systems … [Read more...]
Search Results for: automation
Security Researcher Track: 103
As a security researcher, there are many things to keep in mind when conducting “daily routines,” if such a thing even exists. The computer science industry and related technologies are vast and nearly bottomless, there is just so much to learn that being able to cover everything wouldn’t really be realistic. Don’t get me wrong, strive to learn all that you can, but working on … [Read more...]
Hacking VR With UNHcFREG
Welcome back to another episode of The 443 – Security Simplified. This week, we sit down with three members of the University of New Haven Cyber Forensics Research and Education Group to discuss their resent research into virtual reality application security. UNHcFREG recently discovered several vulnerabilities in the popular VR application BigRoom with results ranging from … [Read more...]
IT Service Providers Face Dilemma: Embrace the Cloud or Get Pushed Out
The adoption of Cloud services is driving an evolution of the IT services landscape, forcing IT service providers to either embrace a Managed Service Provider (MSP) model or quickly be pushed out by those that do. Where being a value-added reseller (VAR) was once the optimal service model, the managed services model is now paving the way forward without signs of stopping. This … [Read more...]
Artificial Intelligence: An Essential Layer of Security for Businesses of All Sizes
Cyber attacks occur in the blink of an eye. A single point of infection can spread like wildfire from endpoint to endpoint; location to location; and business to business. Traditional approaches to protection rely heavily on manual processes and preestablished policies to block attacks that fail to keep up with the ever-evolving nature of threats. Parsing through huge … [Read more...]