Remove Authentication Remove Internet Remove Security Remove Vulnerability
article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. What Is the Log4j Vulnerability?

article thumbnail

ISC East Session Preview: Securing IIoT Using Zero Trust — The Future of IIoT Cybersecurity

Security Industry Association

15-17 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education@ISC East program , including keynote presentations from top luminaries and over 30 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Counter AI-Driven Cybersecurity Threats to Physical Security Products

Security Industry Association

October is Cybersecurity Awareness Month , and the Security Industry Association (SIA) Cybersecurity Advisory Board is marking the occasion with a series of helpful content, tips and guidance on key cybersecurity topics. Zero-day attacks : Zero-day attacks are attacks that exploit vulnerabilities in software that the vendor is not aware of.

article thumbnail

How an MSP protects a business’s VoIP systems

Online Computers

A Voice over Internet Protocol (VoIP) system is a set of technologies that allow for voice and multimedia communications to be sent over the internet. Unfortunately, VoIP systems are vulnerable to a number of cybersecurity threats, such as malware and distributed denial-of-service attacks.

article thumbnail

Ransomware Attackers Find Fresh Targets in Cultural Institutions

Pure Storage

This includes having visibility into your IT estate and staying on top of the security of operating systems, applications, and firmware —and applying critical patches as needed. Check your security team’s work. You’ll want to double down on testing your internal security and ability to ward off an attack. Segment your networks.

Backup 116
article thumbnail

Are Your IoT Devices Leaving the Door Open for Hackers?

NexusTek

Harnessing the global connectivity we now take for granted, the internet of things (IoT) has taken the world by storm, with a multitude of smart gadgets that feed our insatiable hunger for convenience, pique our curiosity about the leading edge of tech, and dazzle us, honestly, just by being plain “cool.”

article thumbnail

SIA New Member Profile: Veridas

Security Industry Association

New Security Industry Association (SIA) member Veridas develops solutions based on artificial intelligence (AI) so people can verify their identities in an agile and simple way using their biometrics. Santos, business development director, Americas, at Veridas, about the company, the security industry and working with SIA.