2018 Critical Infrastructure Risk Assessment

August 31, 2018

Parsons began this effort to explore the state of cybersecurity risk in critical infrastructure facilities with a simple question. The cyber threat has undoubtedly converged – both information technology (IT) and operational technology (OT) environments are being attacked. But, to what degree have solutions to this two-pronged threat actually converged? Parsons is committed to shedding light on the stark differences between IT and OT cyber threats and implications. IT cyber-attacks are fundamentally tied to data, and the theft and nefarious use of stolen information.

Spotlight

The Cyber Advisor

The primary focus of our business is to create security awareness. Whether you are using a laptop, desktop, tablet, smartphone and yes even those smart watches and wearable fitness trackers, you could very well be a victim of the next cyber attack. Due to the increase of cyber attacks, viruses, malware and ransomware threats that have been making the news, you should really get a better understanding of how you can protect yourself against these threats.

OTHER WHITEPAPERS
news image

Open RAN MoU progress update on maturity, security and energy efficiency

whitePaper | September 29, 2022

As the momentum behind Open RAN continues to grow, it is natural that relevant experts and decision makers want to understand its progress and how the Open RAN industry has risen to the challenges, in particular relating to maturity, security and energy efficiency. Over the course of 2022, Open RAN MoU Operators encouraged an open dialogue about Open RAN and have taken steps to understand concerns and address valid questions. This paper represents a progress report that helps to showcase the gains and set the agenda for 2023. In summary:

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Dispatcher Phoenix Security

whitePaper | December 16, 2022

The advancement of technology has transformed the MFP into a key element of a company’s document infrastructure and workflow; however, as the role of the MFP has changed, the risk of security breaches has increased as well. Ensuring document confidentiality, allowing for system authentication, and providing clear audit trails are now necessities in every document-intensive industry. The objective of this white paper is to describe how Konica Minolta’s Dispatcher Phoenix software application helps organizations comply with their security requirements.

Read More
news image

Log More to Improve Visibility and Enhance Security

whitePaper | September 29, 2022

As the amount of system log data grows exponentially, security teams and threat hunters routinely must limit how much they can collect and how long they can store it because of the performance limitations and costs associated with traditional log management tools.

Read More
news image

HackerPowered Security Report 2022 By HackerOne

whitePaper | March 14, 2023

Security automation cannot replace the creativity of humans. In fact, 92% of ethical hackers say they can find vulnerabilities scanners can’t. For the past six years, we’ve been surveying hackers to learn more about how they see the evolving security testing industry. We combine these insights with the world’s largest dataset of vulnerabilities to identify trends that inform our customers how to build an impactful security strategy.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More

Spotlight

The Cyber Advisor

The primary focus of our business is to create security awareness. Whether you are using a laptop, desktop, tablet, smartphone and yes even those smart watches and wearable fitness trackers, you could very well be a victim of the next cyber attack. Due to the increase of cyber attacks, viruses, malware and ransomware threats that have been making the news, you should really get a better understanding of how you can protect yourself against these threats.

Events