Assure Security Risk Assessment

June 13, 2019

Given the increasing frequency of cyber attacks, it is essential to regularly conduct security risk assessments as part of a comprehensive IT security program. In fact, many compliance regulations, such as PCI DSS and HIPAA, require annual IT risk assessments. Unfortunately, not all security auditors understand the special security features of IBM i, and not all IBM i administrators have the knowledge or the time to conduct regular, thorough security assessments.

Spotlight

Boulder Technologies

BoulderTech is an IT Solutions and Services provider within the niche area of cybersecurity and cyberwarfare domain. Our expertise covers Vulnerability and Penetration test, Digital and Cyber Forensics, Threat Intelligence, End Point Protection. Our malware research experts have decades of solid experience working for AntiVirus companies such as Trend Micro, Symantec, CA and Microsoft.

OTHER WHITEPAPERS
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More

Spotlight

Boulder Technologies

BoulderTech is an IT Solutions and Services provider within the niche area of cybersecurity and cyberwarfare domain. Our expertise covers Vulnerability and Penetration test, Digital and Cyber Forensics, Threat Intelligence, End Point Protection. Our malware research experts have decades of solid experience working for AntiVirus companies such as Trend Micro, Symantec, CA and Microsoft.

Events