Tag: threat profile
Every CISO dreams of the unhackable computer. A common method of bullet-proofing a system is to disconnect it from the outside world.1 No Internet. No wireless. No modem. Then you surround the computer with guards and gates. This is called an air-gapped system and it is supposedly hack-proof. In reality, it’s not. In 2010, the…
Read MoreRecent Posts
- An Analyst’s Guide to Cloud-Native Vulnerability Management: Where to Start and How to Scale
- Understanding cyber-incident disclosure
- Healthcare’s Diagnosis is Critical: The Cure is Cybersecurity Hygiene
- Clever ‘GitHub Scanner’ campaign abusing repos to push malware
- Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare Sector
Recent Comments
No comments to show.