PLATFORM SECURITY

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

May 18, 2022

Aerospace cybersecuirty- Bringing a zero-trust
Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Spotlight

Sine-Wave Technologies, Inc.

Infrastructure. Your business depends on it every day, but most businesses rarely worry about the reliability and capacity of their IT systems. At SineWave Technologies, our engineers are obsessed with building and maintaining high-availability (HA) systems, from distributed backup systems to multi-homed network cores to blended data services merging disparate carrier feeds. We design and implement complete solutions, and can monitor and manage your systems 24x7x365. Choose SineWave for your managed IT services.

OTHER WHITEPAPERS
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More
news image

2023 Data Protection Trends Executive Brief United States Edition

whitePaper | February 8, 2023

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 1175 in United States. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Read More
news image

C2 Identity Security White Paper

whitePaper | December 20, 2022

Organizations are adopting distributed and complex network security due to the changing organizational structure trend. C2 Identity is essential to any business to improve convenience and flexibility in managing identity information and access privileges while protecting corporate resources from unauthorized access, both within and outside the organization's boundaries.

Read More
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More

Spotlight

Sine-Wave Technologies, Inc.

Infrastructure. Your business depends on it every day, but most businesses rarely worry about the reliability and capacity of their IT systems. At SineWave Technologies, our engineers are obsessed with building and maintaining high-availability (HA) systems, from distributed backup systems to multi-homed network cores to blended data services merging disparate carrier feeds. We design and implement complete solutions, and can monitor and manage your systems 24x7x365. Choose SineWave for your managed IT services.

Events